Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/openipmi-2.0.29/ui/ui_os.c
Examining data/openipmi-2.0.29/ui/ui_command.h
Examining data/openipmi-2.0.29/ui/ui_keypad.c
Examining data/openipmi-2.0.29/ui/ui_keypad.h
Examining data/openipmi-2.0.29/ui/basic_ui.c
Examining data/openipmi-2.0.29/ui/ui_command.c
Examining data/openipmi-2.0.29/ui/ui.c
Examining data/openipmi-2.0.29/lanserv/lanserv_asf.c
Examining data/openipmi-2.0.29/lanserv/sol.c
Examining data/openipmi-2.0.29/lanserv/marvell-bmc/wiw.h
Examining data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c
Examining data/openipmi-2.0.29/lanserv/sdrcomp/sdrcomp.c
Examining data/openipmi-2.0.29/lanserv/serv.c
Examining data/openipmi-2.0.29/lanserv/lanserv_config.c
Examining data/openipmi-2.0.29/lanserv/extcmd.c
Examining data/openipmi-2.0.29/lanserv/ipmi_sim.c
Examining data/openipmi-2.0.29/lanserv/bmc_picmg.c
Examining data/openipmi-2.0.29/lanserv/OpenIPMI/msg.h
Examining data/openipmi-2.0.29/lanserv/OpenIPMI/ipmbserv.h
Examining data/openipmi-2.0.29/lanserv/OpenIPMI/persist.h
Examining data/openipmi-2.0.29/lanserv/OpenIPMI/serserv.h
Examining data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h
Examining data/openipmi-2.0.29/lanserv/OpenIPMI/mcserv.h
Examining data/openipmi-2.0.29/lanserv/OpenIPMI/extcmd.h
Examining data/openipmi-2.0.29/lanserv/OpenIPMI/serv.h
Examining data/openipmi-2.0.29/lanserv/bmc_storage.c
Examining data/openipmi-2.0.29/lanserv/emu_cmd.c
Examining data/openipmi-2.0.29/lanserv/bmc_app.c
Examining data/openipmi-2.0.29/lanserv/lanserv_oem_force.c
Examining data/openipmi-2.0.29/lanserv/bmc_transport.c
Examining data/openipmi-2.0.29/lanserv/emu.h
Examining data/openipmi-2.0.29/lanserv/config.c
Examining data/openipmi-2.0.29/lanserv/lanserv_ipmi.c
Examining data/openipmi-2.0.29/lanserv/bmc.h
Examining data/openipmi-2.0.29/lanserv/ipmi_checksum.c
Examining data/openipmi-2.0.29/lanserv/lanserv.c
Examining data/openipmi-2.0.29/lanserv/persist.c
Examining data/openipmi-2.0.29/lanserv/bmc.c
Examining data/openipmi-2.0.29/lanserv/priv_table.c
Examining data/openipmi-2.0.29/lanserv/ipmb_ipmi.c
Examining data/openipmi-2.0.29/lanserv/serial_ipmi.c
Examining data/openipmi-2.0.29/lanserv/bmc_chassis.c
Examining data/openipmi-2.0.29/lanserv/bmc_sensor.c
Examining data/openipmi-2.0.29/lib/sensor.c
Examining data/openipmi-2.0.29/lib/ipmi_smi.c
Examining data/openipmi-2.0.29/lib/hmac.c
Examining data/openipmi-2.0.29/lib/strings.c
Examining data/openipmi-2.0.29/lib/domain.c
Examining data/openipmi-2.0.29/lib/pef.c
Examining data/openipmi-2.0.29/lib/aes_cbc.c
Examining data/openipmi-2.0.29/lib/solparm.c
Examining data/openipmi-2.0.29/lib/fru_spd_decode.c
Examining data/openipmi-2.0.29/lib/manfid.h
Examining data/openipmi-2.0.29/lib/ipmi.c
Examining data/openipmi-2.0.29/lib/opq.c
Examining data/openipmi-2.0.29/lib/sel.c
Examining data/openipmi-2.0.29/lib/oem_kontron_conn.c
Examining data/openipmi-2.0.29/lib/control.c
Examining data/openipmi-2.0.29/lib/oem_atca.c
Examining data/openipmi-2.0.29/lib/pet.c
Examining data/openipmi-2.0.29/lib/normal_fru.c
Examining data/openipmi-2.0.29/lib/oem_force_conn.c
Examining data/openipmi-2.0.29/lib/chassis.c
Examining data/openipmi-2.0.29/lib/oem_atca_fru.c
Examining data/openipmi-2.0.29/lib/mc.c
Examining data/openipmi-2.0.29/lib/fru.c
Examining data/openipmi-2.0.29/lib/ipmi_lan.c
Examining data/openipmi-2.0.29/lib/ipmi_sol.c
Examining data/openipmi-2.0.29/lib/md5.c
Examining data/openipmi-2.0.29/lib/oem_motorola_mxp.c
Examining data/openipmi-2.0.29/lib/oem_test.c
Examining data/openipmi-2.0.29/lib/ipmi_payload.c
Examining data/openipmi-2.0.29/lib/conn.c
Examining data/openipmi-2.0.29/lib/oem_atca_conn.c
Examining data/openipmi-2.0.29/lib/lanparm.c
Examining data/openipmi-2.0.29/lib/event.c
Examining data/openipmi-2.0.29/lib/sdr.c
Examining data/openipmi-2.0.29/lib/rakp.c
Examining data/openipmi-2.0.29/lib/ipmi_utils.c
Examining data/openipmi-2.0.29/lib/oem_intel.c
Examining data/openipmi-2.0.29/lib/entity.c
Examining data/openipmi-2.0.29/cmdlang/cmd_domain.c
Examining data/openipmi-2.0.29/cmdlang/cmd_mc.c
Examining data/openipmi-2.0.29/cmdlang/ipmish.c
Examining data/openipmi-2.0.29/cmdlang/cmd_pet.c
Examining data/openipmi-2.0.29/cmdlang/out_fru.c
Examining data/openipmi-2.0.29/cmdlang/cmd_fru.c
Examining data/openipmi-2.0.29/cmdlang/cmd_control.c
Examining data/openipmi-2.0.29/cmdlang/os_debug.c
Examining data/openipmi-2.0.29/cmdlang/cmd_sensor.c
Examining data/openipmi-2.0.29/cmdlang/cmd_sel.c
Examining data/openipmi-2.0.29/cmdlang/cmd_solparm.c
Examining data/openipmi-2.0.29/cmdlang/cmd_conn.c
Examining data/openipmi-2.0.29/cmdlang/cmd_pef.c
Examining data/openipmi-2.0.29/cmdlang/cmdlang.c
Examining data/openipmi-2.0.29/cmdlang/cmd_lanparm.c
Examining data/openipmi-2.0.29/cmdlang/cmd_entity.c
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_string.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_pef.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_glib.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h
Examining data/openipmi-2.0.29/include/OpenIPMI/selector.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_bits.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_picmg.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_tcl.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_sdr.h
Examining data/openipmi-2.0.29/include/OpenIPMI/os_handler.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_auth.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_conn.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_sol.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_log.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_smi.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_ui.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_err.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_debug.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_cmdlang.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_lanparm.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_types.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_addr.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_lan.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_posix.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_msgbits.h
Examining data/openipmi-2.0.29/include/OpenIPMI/mxp.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/locked_list.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/ipmi_entity.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/ipmi_malloc.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/md5.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/ipmi_fru.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/ipmi_int.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/ipmi_sensor.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/ipmi_control.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/opq.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/ipmi_utils.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/ilist.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/ipmi_sel.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/ipmi_oem.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/ipmi_domain.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/ipmi_event.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/ipmi_locks.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/ipmi_mc.h
Examining data/openipmi-2.0.29/include/OpenIPMI/internal/md2.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_pet.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_user.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_mc.h
Examining data/openipmi-2.0.29/include/OpenIPMI/ipmi_solparm.h
Examining data/openipmi-2.0.29/include/OpenIPMI/deprecator.h
Examining data/openipmi-2.0.29/swig/perl/dummystuff.c
Examining data/openipmi-2.0.29/swig/perl/OpenIPMI.h
Examining data/openipmi-2.0.29/swig/perl/OpenIPMI_perl.c
Examining data/openipmi-2.0.29/swig/python/OpenIPMI.h
Examining data/openipmi-2.0.29/unix/selector.c
Examining data/openipmi-2.0.29/unix/posix_thread_os_hnd.c
Examining data/openipmi-2.0.29/unix/test_heap.c
Examining data/openipmi-2.0.29/unix/test_handlers.c
Examining data/openipmi-2.0.29/unix/posix_os_hnd.c
Examining data/openipmi-2.0.29/unix/heap.h
Examining data/openipmi-2.0.29/tcl/test_handlers.c
Examining data/openipmi-2.0.29/tcl/tcl_os_hnd.c
Examining data/openipmi-2.0.29/utils/string.c
Examining data/openipmi-2.0.29/utils/ipmi_malloc.c
Examining data/openipmi-2.0.29/utils/ipmi_auth.c
Examining data/openipmi-2.0.29/utils/hash.c
Examining data/openipmi-2.0.29/utils/os_handler.c
Examining data/openipmi-2.0.29/utils/md5.c
Examining data/openipmi-2.0.29/utils/md2.c
Examining data/openipmi-2.0.29/utils/locks.c
Examining data/openipmi-2.0.29/utils/locked_list.c
Examining data/openipmi-2.0.29/utils/ilist.c
Examining data/openipmi-2.0.29/glib/glib_os_hnd.c
Examining data/openipmi-2.0.29/sample/eventd.c
Examining data/openipmi-2.0.29/sample/ipmicmd.c
Examining data/openipmi-2.0.29/sample/linux_cmd_handler.c
Examining data/openipmi-2.0.29/sample/solterm.c
Examining data/openipmi-2.0.29/sample/example_oem.c
Examining data/openipmi-2.0.29/sample/sample2.c
Examining data/openipmi-2.0.29/sample/sample3.c
Examining data/openipmi-2.0.29/sample/sample.c
Examining data/openipmi-2.0.29/sample/dump_sensors.c
Examining data/openipmi-2.0.29/sample/rmcp_ping.c
Examining data/openipmi-2.0.29/sample/waiter_sample.c
Examining data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c

FINAL RESULTS:

data/openipmi-2.0.29/cmdlang/cmd_domain.c:948:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(s, "%s %s", name, inst);
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:171:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			 ipmi_get_threshold_access_support_string(access));
data/openipmi-2.0.29/cmdlang/ipmish.c:156:5:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vprintf(format, ap);
data/openipmi-2.0.29/cmdlang/ipmish.c:980:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, usage_str, name, name);
data/openipmi-2.0.29/cmdlang/os_debug.c:417:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(gdbm_filename, home);
data/openipmi-2.0.29/cmdlang/os_debug.c:419:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(gdbm_filename, GDBM_FILE);
data/openipmi-2.0.29/glib/glib_os_hnd.c:342:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = vsnprintf(info->data+info->curr, info->len-info->curr, format, ap);
data/openipmi-2.0.29/glib/glib_os_hnd.c:360:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len = vsnprintf(info->data+info->curr, info->len-info->curr,
data/openipmi-2.0.29/glib/glib_os_hnd.c:667:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(info->gdbm_filename, home);
data/openipmi-2.0.29/glib/glib_os_hnd.c:669:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(info->gdbm_filename, GDBM_FILE);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_mc.h:425:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			       ipmi_channel_access_t *access,
data/openipmi-2.0.29/include/OpenIPMI/ipmi_mc.h:433:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
ipmi_channel_access_t *ipmi_channel_access_copy(ipmi_channel_access_t *access);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_mc.h:434:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void ipmi_channel_access_free(ipmi_channel_access_t *access);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_mc.h:439:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int ipmi_channel_access_get_channel(ipmi_channel_access_t *access,
data/openipmi-2.0.29/include/OpenIPMI/ipmi_mc.h:441:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int ipmi_channel_access_get_alerting_enabled(ipmi_channel_access_t *access,
data/openipmi-2.0.29/include/OpenIPMI/ipmi_mc.h:443:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int ipmi_channel_access_set_alerting_enabled(ipmi_channel_access_t *access,
data/openipmi-2.0.29/include/OpenIPMI/ipmi_mc.h:445:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int ipmi_channel_access_get_per_msg_auth(ipmi_channel_access_t *access,
data/openipmi-2.0.29/include/OpenIPMI/ipmi_mc.h:447:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int ipmi_channel_access_set_per_msg_auth(ipmi_channel_access_t *access,
data/openipmi-2.0.29/include/OpenIPMI/ipmi_mc.h:449:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int ipmi_channel_access_get_user_auth(ipmi_channel_access_t *access,
data/openipmi-2.0.29/include/OpenIPMI/ipmi_mc.h:451:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int ipmi_channel_access_set_user_auth(ipmi_channel_access_t *access,
data/openipmi-2.0.29/include/OpenIPMI/ipmi_mc.h:458:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int ipmi_channel_access_get_access_mode(ipmi_channel_access_t *access,
data/openipmi-2.0.29/include/OpenIPMI/ipmi_mc.h:460:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int ipmi_channel_access_set_access_mode(ipmi_channel_access_t *access,
data/openipmi-2.0.29/include/OpenIPMI/ipmi_mc.h:463:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int ipmi_channel_access_get_priv_limit(ipmi_channel_access_t *access,
data/openipmi-2.0.29/include/OpenIPMI/ipmi_mc.h:465:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int ipmi_channel_access_set_priv_limit(ipmi_channel_access_t *access,
data/openipmi-2.0.29/include/OpenIPMI/ipmi_mc.h:469:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int ipmi_channel_access_setall(ipmi_channel_access_t *access);
data/openipmi-2.0.29/lanserv/config.c:341:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(newrv, rv);
data/openipmi-2.0.29/lanserv/config.c:342:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(newrv, val);
data/openipmi-2.0.29/lanserv/emu_cmd.c:1103:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(nf, BASE_CONF_STR);
data/openipmi-2.0.29/lanserv/emu_cmd.c:1105:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(nf, filename);
data/openipmi-2.0.29/lanserv/extcmd.c:265:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(newcmd, *cmd);
data/openipmi-2.0.29/lanserv/extcmd.c:268:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(newcmd, name);
data/openipmi-2.0.29/lanserv/extcmd.c:271:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(newcmd, value);
data/openipmi-2.0.29/lanserv/extcmd.c:300:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(cmd, incmd);
data/openipmi-2.0.29/lanserv/extcmd.c:312:9:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    f = popen(cmd, "r");
data/openipmi-2.0.29/lanserv/extcmd.c:373:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(cmd, incmd);
data/openipmi-2.0.29/lanserv/extcmd.c:391:9:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    f = popen(cmd, "r");
data/openipmi-2.0.29/lanserv/extcmd.c:442:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(cmd, incmd);
data/openipmi-2.0.29/lanserv/extcmd.c:459:9:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    f = popen(cmd, "r");
data/openipmi-2.0.29/lanserv/ipmi_sim.c:681:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len += snprintf(&dummy, 0, mformat, msg->channel, msg->netfn,
data/openipmi-2.0.29/lanserv/ipmi_sim.c:688:8:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	pos = vsprintf(str, format, ap);
data/openipmi-2.0.29/lanserv/ipmi_sim.c:690:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	pos += sprintf(str + pos, mformat, msg->channel, msg->netfn, msg->cmd,
data/openipmi-2.0.29/lanserv/ipmi_sim.c:700:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(str, format, ap);
data/openipmi-2.0.29/lanserv/ipmi_sim.c:726:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = vsnprintf(&dummy, 1, format, ap);
data/openipmi-2.0.29/lanserv/ipmi_sim.c:741:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = vsnprintf(&dummy, 1, format, ap);
data/openipmi-2.0.29/lanserv/ipmi_sim.c:842:5:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    vsnprintf(buffer, sizeof(buffer), format, ap);
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1414:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(cmd + 5, startcmd->startcmd);
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1426:2:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execvp(args[0], args);
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1642:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(command_file, BASE_CONF_STR);
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1644:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(command_file, sysinfo.name);
data/openipmi-2.0.29/lanserv/lanserv.c:444:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len += snprintf(&dummy, 0, mformat, msg->channel, msg->netfn,
data/openipmi-2.0.29/lanserv/lanserv.c:451:8:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	pos = vsprintf(str, format, ap);
data/openipmi-2.0.29/lanserv/lanserv.c:453:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	pos += sprintf(str + pos, mformat, msg->channel, msg->netfn, msg->cmd,
data/openipmi-2.0.29/lanserv/lanserv.c:472:2:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vprintf(format, ap);
data/openipmi-2.0.29/lanserv/lanserv.c:489:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = vsnprintf(&dummy, 1, format, ap);
data/openipmi-2.0.29/lanserv/lanserv.c:505:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = vsnprintf(&dummy, 1, format, ap);
data/openipmi-2.0.29/lanserv/lanserv.c:709:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(cmd + 5, startcmd->startcmd);
data/openipmi-2.0.29/lanserv/lanserv.c:720:2:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execvp(args[0], args);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:251:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	slen = snprintf(&dummy, 0, format);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:256:8:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	pos = sprintf(str, format);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1282:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    len = sprintf(mysernum, "%s-%c", sernum, num + 'A');
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1287:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(mysernum, "System SN %s-%c", sernum, num + 'A');
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1318:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(mac, "System MAC %s%d", sysmac, num + 1);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2097:6:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	    sprintf(filename, h->board[i].filename, j + 1, j + 1);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2105:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(cfilename, h->board[i].create_file, j + 1);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2698:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	rv = system(cmd);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2817:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	out->printf(out, "Invalid board number: %s\n", err);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2823:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	out->printf(out, "Invalid board presence value: %s\n", err);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2851:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("reboot");
data/openipmi-2.0.29/lanserv/persist.c:112:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(app, papp);
data/openipmi-2.0.29/lanserv/persist.c:114:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(app, instance);
data/openipmi-2.0.29/lanserv/persist.c:122:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dname, basedir);
data/openipmi-2.0.29/lanserv/persist.c:124:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(dname, app);
data/openipmi-2.0.29/lanserv/persist.c:158:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = vsnprintf(&dummy, 1, name, aq);
data/openipmi-2.0.29/lanserv/persist.c:163:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    vsprintf(rv, name, ap);
data/openipmi-2.0.29/lanserv/persist.c:204:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(fname, basedir);
data/openipmi-2.0.29/lanserv/persist.c:206:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(fname, app);
data/openipmi-2.0.29/lanserv/persist.c:208:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(fname, p->name);
data/openipmi-2.0.29/lanserv/persist.c:209:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(fname, sfx);
data/openipmi-2.0.29/lanserv/sdrcomp/sdrcomp.c:997:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(newrv, rv);
data/openipmi-2.0.29/lanserv/sdrcomp/sdrcomp.c:998:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat(newrv, val);
data/openipmi-2.0.29/lanserv/serv.c:254:12:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    slen = vsnprintf(&dummy, 0, format, ap);
data/openipmi-2.0.29/lanserv/serv.c:262:11:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    pos = vsprintf(str, format, ap);
data/openipmi-2.0.29/lanserv/sol.c:205:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf, "%s/LCK..%s", uucp_lck_dir, ptr);
data/openipmi-2.0.29/lib/fru_spd_decode.c:124:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(d, idata);
data/openipmi-2.0.29/lib/ipmi.c:100:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, format, ap);
data/openipmi-2.0.29/lib/mc.c:4420:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			   ipmi_channel_access_t *access,
data/openipmi-2.0.29/lib/mc.c:4439:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    memcpy(info, access, sizeof(*info));
data/openipmi-2.0.29/lib/mc.c:4473:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
ipmi_channel_access_copy(ipmi_channel_access_t *access)
data/openipmi-2.0.29/lib/mc.c:4478:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    memcpy(rv, access, sizeof(*rv));
data/openipmi-2.0.29/lib/mc.c:4483:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
ipmi_channel_access_free(ipmi_channel_access_t *access)
data/openipmi-2.0.29/lib/mc.c:4485:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    ipmi_mem_free(access);
data/openipmi-2.0.29/lib/pef.c:2430:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((char *) val, pefc->alert_strings[sel]);
data/openipmi-2.0.29/lib/strings.c:856:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buffer, buf_len, netfn_fs, netfn);
data/openipmi-2.0.29/lib/strings.c:1164:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buffer, buf_len, cmd_fs, cmd);
data/openipmi-2.0.29/lib/strings.c:1215:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buffer, buf_len, cc_fs, cc);
data/openipmi-2.0.29/lib/strings.c:1235:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    return snprintf(dummy, 1, cc_fs, cc);
data/openipmi-2.0.29/sample/dump_sensors.c:210:5:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vprintf(format, ap);
data/openipmi-2.0.29/sample/eventd.c:69:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    printf(format, ##__VA_ARGS__);				\
data/openipmi-2.0.29/sample/eventd.c:276:2:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execv(prog[0], prog);
data/openipmi-2.0.29/sample/eventd.c:297:2:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execv(execvals[0], execvals);
data/openipmi-2.0.29/sample/eventd.c:584:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(newformat, domainname);
data/openipmi-2.0.29/sample/eventd.c:586:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(newformat, format);
data/openipmi-2.0.29/sample/eventd.c:762:6:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	    execv(prog[0], prog);
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:1311:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(usage_str, cmdname);
data/openipmi-2.0.29/sample/sample.c:394:5:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vprintf(format, ap);
data/openipmi-2.0.29/sample/solterm.c:169:5:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vprintf(format, ap);
data/openipmi-2.0.29/tcl/tcl_os_hnd.c:283:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, format, ap);
data/openipmi-2.0.29/tcl/tcl_os_hnd.c:580:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(info->gdbm_filename, home);
data/openipmi-2.0.29/tcl/tcl_os_hnd.c:582:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(info->gdbm_filename, GDBM_FILE);
data/openipmi-2.0.29/tcl/test_handlers.c:72:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, format, ap);
data/openipmi-2.0.29/tcl/test_handlers.c:102:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, format, ap);
data/openipmi-2.0.29/ui/ui.c:212:2:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vprintf(format, ap);
data/openipmi-2.0.29/ui/ui.c:271:2:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vprintf(format, ap);
data/openipmi-2.0.29/ui/ui.c:284:2:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vprintf(format, ap);
data/openipmi-2.0.29/ui/ui.c:629:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, format, ap);
data/openipmi-2.0.29/ui/ui.c:651:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, format, ap);
data/openipmi-2.0.29/ui/ui.c:1536:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(name2, name);
data/openipmi-2.0.29/ui/ui.c:2498:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(name2, name);
data/openipmi-2.0.29/ui/ui.c:6702:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(name2, name);
data/openipmi-2.0.29/ui/ui.c:6748:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(name2, name);
data/openipmi-2.0.29/ui/ui_command.c:98:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(entry->name, name);
data/openipmi-2.0.29/ui/ui_os.c:266:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, format, ap);
data/openipmi-2.0.29/ui/ui_os.c:280:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, format, ap);
data/openipmi-2.0.29/unix/posix_os_hnd.c:371:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, format, ap);
data/openipmi-2.0.29/unix/posix_os_hnd.c:462:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(info->gdbm_filename, home);
data/openipmi-2.0.29/unix/posix_os_hnd.c:464:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(info->gdbm_filename, GDBM_FILE);
data/openipmi-2.0.29/unix/posix_thread_os_hnd.c:372:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, format, ap);
data/openipmi-2.0.29/unix/posix_thread_os_hnd.c:725:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(info->gdbm_filename, home);
data/openipmi-2.0.29/unix/posix_thread_os_hnd.c:727:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(info->gdbm_filename, GDBM_FILE);
data/openipmi-2.0.29/unix/test_handlers.c:71:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, format, ap);
data/openipmi-2.0.29/unix/test_handlers.c:101:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, format, ap);
data/openipmi-2.0.29/utils/ipmi_malloc.c:444:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(rv, str);
data/openipmi-2.0.29/cmdlang/ipmish.c:999:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    colstr = getenv("COLUMNS");
data/openipmi-2.0.29/cmdlang/os_debug.c:411:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *home = getenv("HOME");
data/openipmi-2.0.29/glib/glib_os_hnd.c:278:8:  [3] (random) g_random_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	val = g_random_int();
data/openipmi-2.0.29/glib/glib_os_hnd.c:285:8:  [3] (random) g_random_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	val = g_random_int();
data/openipmi-2.0.29/glib/glib_os_hnd.c:661:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *home = getenv("HOME");
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:1335:6:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	f = getopt_long(argc, argv, "c:o:a:d", options, NULL);
data/openipmi-2.0.29/tcl/tcl_os_hnd.c:574:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *home = getenv("HOME");
data/openipmi-2.0.29/unix/posix_os_hnd.c:456:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *home = getenv("HOME");
data/openipmi-2.0.29/unix/posix_thread_os_hnd.c:719:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *home = getenv("HOME");
data/openipmi-2.0.29/unix/test_heap.c:111:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand(random_seed);
data/openipmi-2.0.29/cmdlang/cmd_conn.c:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            conn_name[IPMI_DOMAIN_NAME_LEN+20];
data/openipmi-2.0.29/cmdlang/cmd_conn.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_conn.c:79:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            conn_name[IPMI_DOMAIN_NAME_LEN+20];
data/openipmi-2.0.29/cmdlang/cmd_conn.c:85:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            buf[256];
data/openipmi-2.0.29/cmdlang/cmd_conn.c:131:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            conn_name[IPMI_DOMAIN_NAME_LEN+20];
data/openipmi-2.0.29/cmdlang/cmd_control.c:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            control_name[IPMI_CONTROL_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_control.c:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_control.c:198:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            control_name[IPMI_CONTROL_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_control.c:216:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            control_name[IPMI_CONTROL_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_control.c:529:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            control_name[IPMI_CONTROL_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_control.c:639:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            control_name[IPMI_CONTROL_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_control.c:694:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            control_name[IPMI_CONTROL_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:81:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   guid[16];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:143:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:160:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:427:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:551:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:586:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char    data[100];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:706:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:794:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:846:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:871:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:910:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:957:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:969:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:1049:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:1071:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:1091:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errval[128];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:1116:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_domain.c:1200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:122:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:140:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:154:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:307:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:323:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:348:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:399:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:470:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:521:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:591:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:640:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:688:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:737:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:787:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:812:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:813:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            errbuf[32];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:884:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:926:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:961:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_entity.c:1008:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_fru.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fru_name[IPMI_FRU_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_fru.c:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_fru.c:86:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fru_name[IPMI_FRU_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_fru.c:93:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *areas[IPMI_FRU_FTR_NUMBER] =
data/openipmi-2.0.29/cmdlang/cmd_fru.c:106:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fru_name[IPMI_FRU_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_fru.c:141:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fru_name[IPMI_FRU_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_fru.c:185:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fru_name[IPMI_FRU_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_fru.c:228:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fru_name[IPMI_FRU_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_fru.c:533:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fru_name[IPMI_FRU_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_fru.c:581:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fru_name[IPMI_FRU_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_fru.c:629:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fru_name[IPMI_FRU_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_fru.c:685:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fru_name[IPMI_FRU_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            lanparm_name[IPMI_LANPARM_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:86:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            lanparm_name[IPMI_LANPARM_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            lanparm_name[IPMI_LANPARM_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:161:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[IPMI_LANPARM_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:226:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              name[LAN_CONFIG_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:464:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  v[6];
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:478:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char v[6];
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:509:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          v[100];
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:701:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  v[6];
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:715:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char v[6];
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:749:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *user_names[5] =
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:812:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              lanparm_name[IPMI_LANPARM_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:880:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[LAN_CONFIG_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:1274:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:86:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char vals[4];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:87:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          str[100];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:88:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char guid[16];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:139:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:154:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:224:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:303:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            str[20];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:304:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:339:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:384:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:457:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:512:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:546:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:573:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   data[100];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:655:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:689:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char       str[20];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:798:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:862:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:942:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:946:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   data[3];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:1103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:1294:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:1330:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:1594:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:1596:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            str[17];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:1756:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[16];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:1759:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            pw[20];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:1768:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:2053:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:2086:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_mc.c:2121:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_pef.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            pef_name[IPMI_PEF_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_pef.c:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_pef.c:86:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_pef.c:96:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            pef_name[IPMI_PEF_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_pef.c:112:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            pef_name[IPMI_PEF_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_pef.c:158:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            pef_name[IPMI_PEF_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_pef.c:200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              name[PEF_CONFIG_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_pef.c:337:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  v[16];
data/openipmi-2.0.29/cmdlang/cmd_pef.c:338:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           tmp[3];
data/openipmi-2.0.29/cmdlang/cmd_pef.c:353:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp, val+(i*2), 2);
data/openipmi-2.0.29/cmdlang/cmd_pef.c:375:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  v[16];
data/openipmi-2.0.29/cmdlang/cmd_pef.c:377:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           str[33];
data/openipmi-2.0.29/cmdlang/cmd_pef.c:385:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    s += sprintf(s, "%2.2x", v[i]);
data/openipmi-2.0.29/cmdlang/cmd_pef.c:521:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          v[100];
data/openipmi-2.0.29/cmdlang/cmd_pef.c:662:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              pef_name[IPMI_PEF_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_pef.c:730:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[PEF_CONFIG_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_pef.c:1153:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_pet.c:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            pet_name[IPMI_PET_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_pet.c:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_pet.c:81:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_pet.c:92:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   mac_addr[6];
data/openipmi-2.0.29/cmdlang/cmd_pet.c:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            pet_name[IPMI_PET_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_pet.c:121:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            pet_name[IPMI_PET_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_pet.c:136:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   mac_addr[6];
data/openipmi-2.0.29/cmdlang/cmd_pet.c:244:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   mac_addr[6];
data/openipmi-2.0.29/cmdlang/cmd_pet.c:342:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            pet_name[IPMI_PET_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sel.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sel.c:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sel.c:112:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sel.c:187:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sel.c:256:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sel.c:368:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sel.c:392:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   data[13];
data/openipmi-2.0.29/cmdlang/cmd_sel.c:451:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sel.c:482:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sel.c:500:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:167:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char                        th_name[50];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:316:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:339:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:409:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:490:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:601:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:675:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:774:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:831:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:907:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:952:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    char th_name[50];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:1044:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:1211:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:1261:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:1318:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_solparm.c:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            solparm_name[IPMI_SOLPARM_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_solparm.c:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_solparm.c:86:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_solparm.c:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            solparm_name[IPMI_SOLPARM_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_solparm.c:125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            solparm_name[IPMI_SOLPARM_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_solparm.c:161:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[IPMI_SOLPARM_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_solparm.c:226:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              name[SOL_CONFIG_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_solparm.c:406:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              solparm_name[IPMI_SOLPARM_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_solparm.c:474:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[SOL_CONFIG_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmd_solparm.c:810:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmdlang.c:183:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               domain_name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmdlang.c:260:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[IPMI_PET_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmdlang.c:357:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[IPMI_LANPARM_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmdlang.c:454:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[IPMI_SOLPARM_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmdlang.c:551:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[IPMI_PEF_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmdlang.c:649:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[IPMI_FRU_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmdlang.c:746:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               entity_name[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmdlang.c:848:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               sensor_name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmdlang.c:939:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                control_name[IPMI_CONTROL_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmdlang.c:1028:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            mc_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/cmdlang/cmdlang.c:1267:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               *argv[MAXARGS];
data/openipmi-2.0.29/cmdlang/cmdlang.c:1540:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sval[20];
data/openipmi-2.0.29/cmdlang/cmdlang.c:1542:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sval, "%d", value);
data/openipmi-2.0.29/cmdlang/cmdlang.c:1551:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sval[80];
data/openipmi-2.0.29/cmdlang/cmdlang.c:1553:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sval, "%e", value);
data/openipmi-2.0.29/cmdlang/cmdlang.c:1562:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sval[20];
data/openipmi-2.0.29/cmdlang/cmdlang.c:1564:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sval, "0x%x", value);
data/openipmi-2.0.29/cmdlang/cmdlang.c:1573:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sval[32];
data/openipmi-2.0.29/cmdlang/cmdlang.c:1575:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sval, "%ld", value);
data/openipmi-2.0.29/cmdlang/cmdlang.c:1635:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sval[40];
data/openipmi-2.0.29/cmdlang/cmdlang.c:1637:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sval, "%lld", (long long) value);
data/openipmi-2.0.29/cmdlang/cmdlang.c:1646:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sval[40];
data/openipmi-2.0.29/cmdlang/cmdlang.c:1648:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sval, "%lld", (long long) value);
data/openipmi-2.0.29/cmdlang/cmdlang.c:1657:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char outstr[16];
data/openipmi-2.0.29/cmdlang/cmdlang.c:1661:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(outstr, "%d.%d.%d.%d",
data/openipmi-2.0.29/cmdlang/cmdlang.c:1671:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		     const char      *name,
data/openipmi-2.0.29/cmdlang/cmdlang.c:1672:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		     unsigned char   mac_addr[6])
data/openipmi-2.0.29/cmdlang/cmdlang.c:1674:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char outstr[18];
data/openipmi-2.0.29/cmdlang/cmdlang.c:1677:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(outstr, "%2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x",
data/openipmi-2.0.29/cmdlang/cmdlang.c:1929:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(val, ent->h_addr_list[0], ent->h_length);
data/openipmi-2.0.29/cmdlang/cmdlang.c:1935:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ipmi_cmdlang_get_mac(char *str, unsigned char val[6], ipmi_cmd_info_t *info)
data/openipmi-2.0.29/cmdlang/cmdlang.c:1935:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ipmi_cmdlang_get_mac(char *str, unsigned char val[6], ipmi_cmd_info_t *info)
data/openipmi-2.0.29/cmdlang/cmdlang.c:1937:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          tmp[3];
data/openipmi-2.0.29/cmdlang/cmdlang.c:1940:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp_val[6];
data/openipmi-2.0.29/cmdlang/cmdlang.c:1962:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp, str, len);
data/openipmi-2.0.29/cmdlang/cmdlang.c:1971:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(val, tmp_val, sizeof(tmp_val));
data/openipmi-2.0.29/cmdlang/cmdlang.c:2014:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                        val[4][20];
data/openipmi-2.0.29/cmdlang/cmdlang.c:2039:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(val[vc], start, len);
data/openipmi-2.0.29/cmdlang/cmdlang.c:2189:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  val[4][20];
data/openipmi-2.0.29/cmdlang/cmdlang.c:2215:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(val[vc], start, len);
data/openipmi-2.0.29/cmdlang/cmdlang.c:2362:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(entry->value, value, len);
data/openipmi-2.0.29/cmdlang/cmdlang.c:2415:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(entry->value, value, len);
data/openipmi-2.0.29/cmdlang/ipmish.c:570:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char cmdlang_objstr[IPMI_MAX_NAME_LEN];
data/openipmi-2.0.29/cmdlang/ipmish.c:596:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errval[128];
data/openipmi-2.0.29/cmdlang/ipmish.c:795:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           cmdline[256];
data/openipmi-2.0.29/cmdlang/ipmish.c:813:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    s = fopen(fname, "r");
data/openipmi-2.0.29/cmdlang/os_debug.c:244:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open("/dev/urandom", O_RDONLY);
data/openipmi-2.0.29/cmdlang/out_fru.c:148:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                      fru_name[IPMI_FRU_NAME_LEN];
data/openipmi-2.0.29/glib/glib_os_hnd.c:253:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open("/dev/urandom", O_RDONLY);
data/openipmi-2.0.29/glib/glib_os_hnd.c:279:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out, &val, sizeof(val));
data/openipmi-2.0.29/glib/glib_os_hnd.c:286:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out, &val, len);
data/openipmi-2.0.29/glib/glib_os_hnd.c:355:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(nd, info->data, info->curr);
data/openipmi-2.0.29/glib/glib_os_hnd.c:864:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rv, &ipmi_glib_os_handler, sizeof(*rv));
data/openipmi-2.0.29/include/OpenIPMI/ipmi_addr.h:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  data[IPMI_MAX_ADDR_SIZE];
data/openipmi-2.0.29/include/OpenIPMI/ipmi_addr.h:161:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char oem_iana[3];
data/openipmi-2.0.29/include/OpenIPMI/ipmi_cmdlang.h:251:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			  const char      *name,
data/openipmi-2.0.29/include/OpenIPMI/ipmi_cmdlang.h:252:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			  unsigned char   mac_addr[6]);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_cmdlang.h:292:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ipmi_cmdlang_get_mac(char *str, unsigned char val[6],
data/openipmi-2.0.29/include/OpenIPMI/ipmi_cmdlang.h:292:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ipmi_cmdlang_get_mac(char *str, unsigned char val[6],
data/openipmi-2.0.29/include/OpenIPMI/ipmi_conn.h:357:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ipmb_addr[MAX_IPMI_USED_CHANNELS];
data/openipmi-2.0.29/include/OpenIPMI/ipmi_lan.h:329:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				    unsigned char  iana[3],
data/openipmi-2.0.29/include/OpenIPMI/ipmi_lan.h:438:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					   unsigned char               iana[3],
data/openipmi-2.0.29/include/OpenIPMI/ipmi_lan.h:486:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					    unsigned char                 iana[3],
data/openipmi-2.0.29/include/OpenIPMI/ipmi_lan.h:537:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				      unsigned char          iana[3],
data/openipmi-2.0.29/include/OpenIPMI/ipmi_pet.h:84:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char    mac_addr[6],
data/openipmi-2.0.29/include/OpenIPMI/ipmi_pet.h:100:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       unsigned char    mac_addr[6],
data/openipmi-2.0.29/include/OpenIPMI/ipmi_pet.h:137:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char *ipmi_pet_get_mac_addr(ipmi_pet_t    *pet,
data/openipmi-2.0.29/include/OpenIPMI/ipmi_pet.h:138:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				     unsigned char mac_addr[6]);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_types.h:144:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[IPMI_MAX_MSG_LENGTH];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:110:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rand[16];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:111:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rem_rand[16];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:114:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char username[16];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:115:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sik[20];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:116:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char k1[20];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:117:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char k2[20];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:188:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ip_addr[4];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:189:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mac_addr[6];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:190:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char subnet_mask[4];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:191:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char default_gw_ip_addr[4];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:192:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char default_gw_mac_addr[6];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:193:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char backup_gw_ip_addr[4];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:194:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char backup_gw_mac_addr[6];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:197:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ipv4_hdr_parms[3];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:199:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char vlan_id[2];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:202:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cipher_suite_entry[17];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:203:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char max_priv_for_cipher_suite[9];
data/openipmi-2.0.29/lanserv/OpenIPMI/lanserv.h:263:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char lanparm_changed[lanread_len];
data/openipmi-2.0.29/lanserv/OpenIPMI/mcserv.h:125:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			 unsigned char guid[16],
data/openipmi-2.0.29/lanserv/OpenIPMI/mcserv.h:133:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       unsigned char record_type,
data/openipmi-2.0.29/lanserv/OpenIPMI/mcserv.h:134:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		       unsigned char event[13],
data/openipmi-2.0.29/lanserv/OpenIPMI/mcserv.h:227:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				 unsigned char lun,
data/openipmi-2.0.29/lanserv/OpenIPMI/mcserv.h:228:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				 unsigned char sens_num,
data/openipmi-2.0.29/lanserv/OpenIPMI/mcserv.h:229:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				 unsigned char support,
data/openipmi-2.0.29/lanserv/OpenIPMI/mcserv.h:232:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				 unsigned char values[6]);
data/openipmi-2.0.29/lanserv/OpenIPMI/mcserv.h:306:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ipmi_set_mfg_id(lmc_data_t *emu, unsigned char mfg_id[3]);
data/openipmi-2.0.29/lanserv/OpenIPMI/mcserv.h:307:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ipmi_get_mfg_id(lmc_data_t *emu, unsigned char mfg_id[3]);
data/openipmi-2.0.29/lanserv/OpenIPMI/mcserv.h:308:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ipmi_set_product_id(lmc_data_t *emu, unsigned char product_id[3]);
data/openipmi-2.0.29/lanserv/OpenIPMI/mcserv.h:309:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ipmi_get_product_id(lmc_data_t *emu, unsigned char product_id[3]);
data/openipmi-2.0.29/lanserv/OpenIPMI/mcserv.h:412:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				 unsigned char aux_fw_revision[4]);
data/openipmi-2.0.29/lanserv/OpenIPMI/msg.h:84:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    unsigned char authcode_data[16];
data/openipmi-2.0.29/lanserv/OpenIPMI/msg.h:91:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    unsigned char iana[3];
data/openipmi-2.0.29/lanserv/OpenIPMI/serserv.h:112:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char attn_chars[8];
data/openipmi-2.0.29/lanserv/OpenIPMI/serv.h:232:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char username[16];
data/openipmi-2.0.29/lanserv/OpenIPMI/serv.h:233:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char pw[20];
data/openipmi-2.0.29/lanserv/OpenIPMI/serv.h:264:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char event_filter_table[MAX_EVENT_FILTERS][21];
data/openipmi-2.0.29/lanserv/OpenIPMI/serv.h:265:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char event_filter_data1[MAX_EVENT_FILTERS][2];
data/openipmi-2.0.29/lanserv/OpenIPMI/serv.h:267:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char alert_policy_table[MAX_ALERT_POLICIES][4];
data/openipmi-2.0.29/lanserv/OpenIPMI/serv.h:268:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char system_guid[17];
data/openipmi-2.0.29/lanserv/OpenIPMI/serv.h:270:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char alert_string_keys[MAX_ALERT_STRINGS][3];
data/openipmi-2.0.29/lanserv/OpenIPMI/serv.h:271:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char alert_strings[MAX_ALERT_STRINGS][MAX_ALERT_STRING_LEN];
data/openipmi-2.0.29/lanserv/OpenIPMI/serv.h:280:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char event_filter_table[MAX_EVENT_FILTERS];
data/openipmi-2.0.29/lanserv/OpenIPMI/serv.h:281:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char event_filter_data1[MAX_EVENT_FILTERS];
data/openipmi-2.0.29/lanserv/OpenIPMI/serv.h:282:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char alert_policy_table[MAX_ALERT_POLICIES];
data/openipmi-2.0.29/lanserv/bmc.c:167:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(msg->data, msg->data + 3, msg->len - 3);
data/openipmi-2.0.29/lanserv/bmc.c:174:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rdata + 4, rdata + 1, *rdata_len);
data/openipmi-2.0.29/lanserv/bmc.c:537:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addr->addr_data, addr_data, addr_len);
data/openipmi-2.0.29/lanserv/bmc.c:584:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		     unsigned char guid[16],
data/openipmi-2.0.29/lanserv/bmc.c:588:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mc->guid, guid, 16);
data/openipmi-2.0.29/lanserv/bmc.c:885:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char ipmb,
data/openipmi-2.0.29/lanserv/bmc.c:886:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char device_id,
data/openipmi-2.0.29/lanserv/bmc.c:887:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char has_device_sdrs,
data/openipmi-2.0.29/lanserv/bmc.c:888:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char device_revision,
data/openipmi-2.0.29/lanserv/bmc.c:889:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char major_fw_rev,
data/openipmi-2.0.29/lanserv/bmc.c:890:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char minor_fw_rev,
data/openipmi-2.0.29/lanserv/bmc.c:891:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char device_support,
data/openipmi-2.0.29/lanserv/bmc.c:892:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char mfg_id[3],
data/openipmi-2.0.29/lanserv/bmc.c:893:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char product_id[2],
data/openipmi-2.0.29/lanserv/bmc.c:916:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mc->mfg_id, mfg_id, 3);
data/openipmi-2.0.29/lanserv/bmc.c:917:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mc->product_id, product_id, 2);
data/openipmi-2.0.29/lanserv/bmc.c:1070:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ipmi_set_mfg_id(lmc_data_t *mc, unsigned char mfg_id[3])
data/openipmi-2.0.29/lanserv/bmc.c:1072:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mc->mfg_id, mfg_id, 3);
data/openipmi-2.0.29/lanserv/bmc.c:1076:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ipmi_get_mfg_id(lmc_data_t *mc, unsigned char mfg_id[3])
data/openipmi-2.0.29/lanserv/bmc.c:1078:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mfg_id, mc->mfg_id, 3);
data/openipmi-2.0.29/lanserv/bmc.c:1082:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ipmi_set_product_id(lmc_data_t *mc, unsigned char product_id[2])
data/openipmi-2.0.29/lanserv/bmc.c:1084:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mc->product_id, product_id, 2);
data/openipmi-2.0.29/lanserv/bmc.c:1109:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ipmi_get_product_id(lmc_data_t *mc, unsigned char product_id[2])
data/openipmi-2.0.29/lanserv/bmc.c:1111:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(product_id, mc->product_id, 2);
data/openipmi-2.0.29/lanserv/bmc.h:71:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[16];
data/openipmi-2.0.29/lanserv/bmc.h:136:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char thresholds[6];
data/openipmi-2.0.29/lanserv/bmc.h:210:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char guid[16];
data/openipmi-2.0.29/lanserv/bmc.h:227:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char evq[16];
data/openipmi-2.0.29/lanserv/bmc.h:237:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mfg_id[3];	   /* bytes 8-10 */
data/openipmi-2.0.29/lanserv/bmc.h:238:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char product_id[2];   /* bytes 11-12 */
data/openipmi-2.0.29/lanserv/bmc.h:239:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char aux_fw_rev[4];   /* bytes 13-16 */
data/openipmi-2.0.29/lanserv/bmc.h:281:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char lun_has_sensors[4];
data/openipmi-2.0.29/lanserv/bmc.h:282:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char num_sensors_per_lun[4];
data/openipmi-2.0.29/lanserv/bmc.h:348:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char addr_data[MAX_EMU_ADDR_DATA];
data/openipmi-2.0.29/lanserv/bmc.h:405:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  unsigned char record_type,
data/openipmi-2.0.29/lanserv/bmc.h:406:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  unsigned char event[13]);
data/openipmi-2.0.29/lanserv/bmc_app.c:76:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rdata+7, mc->mfg_id, 3);
data/openipmi-2.0.29/lanserv/bmc_app.c:77:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rdata+10, mc->product_id, 2);
data/openipmi-2.0.29/lanserv/bmc_app.c:78:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rdata+12, mc->aux_fw_rev, 4);
data/openipmi-2.0.29/lanserv/bmc_app.c:97:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ipmi_mc_set_aux_fw_revision(lmc_data_t *mc, unsigned char aux_fw_revision[4])
data/openipmi-2.0.29/lanserv/bmc_app.c:99:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mc->aux_fw_rev, aux_fw_revision, 4);
data/openipmi-2.0.29/lanserv/bmc_app.c:743:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mc->users[user].username, msg->data+1, 16);
data/openipmi-2.0.29/lanserv/bmc_app.c:781:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rdata+1, mc->users[user].username, 16);
data/openipmi-2.0.29/lanserv/bmc_app.c:826:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(mc->users[user].pw, msg->data+2, 16);
data/openipmi-2.0.29/lanserv/bmc_app.c:907:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rdata + 1, mc->evq, 16);
data/openipmi-2.0.29/lanserv/bmc_app.c:1005:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rdata + 2, qmsg->data + 1, qmsg->len + 1);
data/openipmi-2.0.29/lanserv/bmc_chassis.c:329:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char val[2];
data/openipmi-2.0.29/lanserv/bmc_picmg.c:64:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[13];
data/openipmi-2.0.29/lanserv/bmc_picmg.c:893:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(emu->temp_fru_inv_data, fru->data, 
data/openipmi-2.0.29/lanserv/bmc_picmg.c:944:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fru->data, emu->temp_fru_inv_data,
data/openipmi-2.0.29/lanserv/bmc_picmg.c:1011:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(emu->temp_fru_inv_data+offset, msg->data+6, count);
data/openipmi-2.0.29/lanserv/bmc_picmg.c:1061:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rdata+10, ap->addr_data, ap->addr_len);
data/openipmi-2.0.29/lanserv/bmc_sensor.c:241:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rdata+3, entry->data+offset, count);
data/openipmi-2.0.29/lanserv/bmc_sensor.c:324:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[13];
data/openipmi-2.0.29/lanserv/bmc_sensor.c:969:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			     unsigned char lun,
data/openipmi-2.0.29/lanserv/bmc_sensor.c:970:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			     unsigned char sens_num,
data/openipmi-2.0.29/lanserv/bmc_sensor.c:971:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			     unsigned char support,
data/openipmi-2.0.29/lanserv/bmc_sensor.c:974:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			     unsigned char values[6])
data/openipmi-2.0.29/lanserv/bmc_sensor.c:985:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sensor->thresholds, values, 6);
data/openipmi-2.0.29/lanserv/bmc_sensor.c:1083:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    unsigned char thresh_val[6];
data/openipmi-2.0.29/lanserv/bmc_sensor.c:1238:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(f->filename, O_RDONLY);
data/openipmi-2.0.29/lanserv/bmc_sensor.c:1255:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[4];
data/openipmi-2.0.29/lanserv/bmc_sensor.c:1275:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[100];
data/openipmi-2.0.29/lanserv/bmc_sensor.c:1648:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&mc->pef_rollback, &mc->pef,
data/openipmi-2.0.29/lanserv/bmc_sensor.c:1700:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(mc->pef.event_filter_table[set], msg->data+1, 21);
data/openipmi-2.0.29/lanserv/bmc_sensor.c:1713:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(mc->pef.event_filter_data1[set], msg->data+1, 2);
data/openipmi-2.0.29/lanserv/bmc_sensor.c:1726:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(mc->pef.alert_policy_table[set], msg->data+1, 4);
data/openipmi-2.0.29/lanserv/bmc_sensor.c:1735:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(mc->pef.system_guid, msg->data+1, 17);
data/openipmi-2.0.29/lanserv/bmc_sensor.c:1748:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(mc->pef.alert_string_keys[set], msg->data+1, 3);
data/openipmi-2.0.29/lanserv/bmc_sensor.c:1769:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(mc->pef.alert_strings[set]+(block*16), msg->data+3, dlen);
data/openipmi-2.0.29/lanserv/bmc_sensor.c:1794:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmpdata[18];
data/openipmi-2.0.29/lanserv/bmc_sensor.c:1903:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(tmpdata+2, mc->pef.alert_strings[set]+(block*16), 16);
data/openipmi-2.0.29/lanserv/bmc_sensor.c:1923:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rdata + 2, data, length);
data/openipmi-2.0.29/lanserv/bmc_storage.c:110:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(n->data, data, 16);
data/openipmi-2.0.29/lanserv/bmc_storage.c:208:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		   unsigned char record_type,
data/openipmi-2.0.29/lanserv/bmc_storage.c:209:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		   unsigned char event[13],
data/openipmi-2.0.29/lanserv/bmc_storage.c:249:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(e->data+7, event+4, 9);
data/openipmi-2.0.29/lanserv/bmc_storage.c:251:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(e->data+3, event, 13);
data/openipmi-2.0.29/lanserv/bmc_storage.c:278:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     unsigned char record_type,
data/openipmi-2.0.29/lanserv/bmc_storage.c:279:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	     unsigned char event[13])
data/openipmi-2.0.29/lanserv/bmc_storage.c:295:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mc->evq + 3, event, 13);
data/openipmi-2.0.29/lanserv/bmc_storage.c:446:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rdata+3, entry->data+offset, count);
data/openipmi-2.0.29/lanserv/bmc_storage.c:816:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sdr->data, data, len);
data/openipmi-2.0.29/lanserv/bmc_storage.c:874:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(entry->data+2, data+2, data_len-2);
data/openipmi-2.0.29/lanserv/bmc_storage.c:903:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(entry->data+2, data+2, data_len-2);
data/openipmi-2.0.29/lanserv/bmc_storage.c:1074:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rdata+3, entry->data+offset, count);
data/openipmi-2.0.29/lanserv/bmc_storage.c:1119:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(entry->data+2, msg->data+2, entry->length-2);
data/openipmi-2.0.29/lanserv/bmc_storage.c:1192:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mc->part_add_sdr->data+2, msg->data+8, msg->len - 8);
data/openipmi-2.0.29/lanserv/bmc_storage.c:1214:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mc->part_add_sdr->data+offset, msg->data+6, msg->len-6);
data/openipmi-2.0.29/lanserv/bmc_storage.c:1747:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rdata + 2, data + offset, count);
data/openipmi-2.0.29/lanserv/bmc_storage.c:1819:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fru->data+offset, msg->data+3, count);
data/openipmi-2.0.29/lanserv/bmc_storage.c:1877:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data, fru->data, length);
data/openipmi-2.0.29/lanserv/bmc_storage.c:1924:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fru->data, data, length);
data/openipmi-2.0.29/lanserv/bmc_storage.c:1995:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(info->filename, O_RDONLY);
data/openipmi-2.0.29/lanserv/bmc_storage.c:2042:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(info->filename, O_WRONLY);
data/openipmi-2.0.29/lanserv/bmc_transport.c:176:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&mc->sol.solparm, &mc->sol.solparm_rollback,
data/openipmi-2.0.29/lanserv/bmc_transport.c:187:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&mc->sol.solparm_rollback, &mc->sol.solparm,
data/openipmi-2.0.29/lanserv/config.c:101:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(users[j].username, data, len);
data/openipmi-2.0.29/lanserv/config.c:106:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(users[j].pw, data, len);
data/openipmi-2.0.29/lanserv/config.c:529:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data, tok, end);
data/openipmi-2.0.29/lanserv/config.c:534:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char         c[3];
data/openipmi-2.0.29/lanserv/config.c:590:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(addr, res0->ai_addr, res0->ai_addrlen);
data/openipmi-2.0.29/lanserv/config.c:741:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE         *f = fopen(config_file, "r");
data/openipmi-2.0.29/lanserv/config.c:744:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         buf[MAX_CONFIG_LINE];
data/openipmi-2.0.29/lanserv/emu.h:84:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char ipmb,
data/openipmi-2.0.29/lanserv/emu.h:85:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char device_id,
data/openipmi-2.0.29/lanserv/emu.h:86:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char has_device_sdrs,
data/openipmi-2.0.29/lanserv/emu.h:87:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char device_revision,
data/openipmi-2.0.29/lanserv/emu.h:88:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char major_fw_rev,
data/openipmi-2.0.29/lanserv/emu.h:89:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char minor_fw_rev,
data/openipmi-2.0.29/lanserv/emu.h:90:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char device_support,
data/openipmi-2.0.29/lanserv/emu.h:91:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char mfg_id[3],
data/openipmi-2.0.29/lanserv/emu.h:92:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    unsigned char product_id[2],
data/openipmi-2.0.29/lanserv/emu_cmd.c:223:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data, tok, end);
data/openipmi-2.0.29/lanserv/emu_cmd.c:228:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char         c[3];
data/openipmi-2.0.29/lanserv/emu_cmd.c:255:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *f = fopen(command_file, "r");
data/openipmi-2.0.29/lanserv/emu_cmd.c:331:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[13];
data/openipmi-2.0.29/lanserv/emu_cmd.c:357:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[256];
data/openipmi-2.0.29/lanserv/emu_cmd.c:380:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[256];
data/openipmi-2.0.29/lanserv/emu_cmd.c:652:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char thresholds[6];
data/openipmi-2.0.29/lanserv/emu_cmd.c:776:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mfg_id[3];
data/openipmi-2.0.29/lanserv/emu_cmd.c:778:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char product_id[2];
data/openipmi-2.0.29/lanserv/emu_cmd.c:843:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char guid[16];
data/openipmi-2.0.29/lanserv/emu_cmd.c:901:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MAX_FRU_SIZE];
data/openipmi-2.0.29/lanserv/extcmd.c:161:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cbuf[20]; /* Big enough to hold IP, MAC and src */
data/openipmi-2.0.29/lanserv/extcmd.c:178:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%u %u", (unsigned char)loc[0], (unsigned char)loc[1]);
data/openipmi-2.0.29/lanserv/extcmd.c:199:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(buf, "%u", *((unsigned char *) loc));
data/openipmi-2.0.29/lanserv/extcmd.c:216:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(buf, "%d", *((int *) loc));
data/openipmi-2.0.29/lanserv/extcmd.c:270:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(newcmd, " \"");
data/openipmi-2.0.29/lanserv/extcmd.c:291:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2048];
data/openipmi-2.0.29/lanserv/extcmd.c:301:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(cmd, " get");
data/openipmi-2.0.29/lanserv/extcmd.c:363:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2048];
data/openipmi-2.0.29/lanserv/extcmd.c:374:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(cmd, " set");
data/openipmi-2.0.29/lanserv/extcmd.c:433:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2048];
data/openipmi-2.0.29/lanserv/extcmd.c:443:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(cmd, " check");
data/openipmi-2.0.29/lanserv/ipmb_ipmi.c:63:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char msg[(IPMI_SIM_MAX_MSG_LENGTH + 7) * 3];
data/openipmi-2.0.29/lanserv/ipmb_ipmi.c:73:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(msg + 7, imsg->data, imsg->len);
data/openipmi-2.0.29/lanserv/ipmi_checksum.c:6:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char buffer[65536];
data/openipmi-2.0.29/lanserv/ipmi_sim.c:148:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1024];
data/openipmi-2.0.29/lanserv/ipmi_sim.c:157:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tn_buf[4];
data/openipmi-2.0.29/lanserv/ipmi_sim.c:198:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char    msgd[36];
data/openipmi-2.0.29/lanserv/ipmi_sim.c:210:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open("/dev/urandom", O_RDONLY);
data/openipmi-2.0.29/lanserv/ipmi_sim.c:271:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char msgd[256];
data/openipmi-2.0.29/lanserv/ipmi_sim.c:353:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char addr_data[6];
data/openipmi-2.0.29/lanserv/ipmi_sim.c:379:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(addr_data,
data/openipmi-2.0.29/lanserv/ipmi_sim.c:382:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(addr_data + 4,
data/openipmi-2.0.29/lanserv/ipmi_sim.c:418:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char msgd[256];
data/openipmi-2.0.29/lanserv/ipmi_sim.c:581:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ipmi_fd = open(ipmi_dev, O_RDWR);
data/openipmi-2.0.29/lanserv/ipmi_sim.c:593:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char msgd[256];
data/openipmi-2.0.29/lanserv/ipmi_sim.c:695:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    pos += sprintf(str + pos, " %2.2x", msg->data[i]);
data/openipmi-2.0.29/lanserv/ipmi_sim.c:837:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[500];
data/openipmi-2.0.29/lanserv/ipmi_sim.c:994:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  rc[50];
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1413:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(cmd, "exec ");
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1423:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *args[4] = { "/bin/sh", "-c", cmd, NULL };
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1645:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(command_file, ".emu");
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1646:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	tf = fopen(command_file, "r");
data/openipmi-2.0.29/lanserv/lanserv.c:173:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             addr_data[sizeof(struct ipmi_addr)];
data/openipmi-2.0.29/lanserv/lanserv.c:236:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open("/dev/urandom", O_RDONLY);
data/openipmi-2.0.29/lanserv/lanserv.c:263:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             addr_data[sizeof(struct ipmi_addr)];
data/openipmi-2.0.29/lanserv/lanserv.c:265:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char    data[IPMI_MAX_MSG_LENGTH+8];
data/openipmi-2.0.29/lanserv/lanserv.c:266:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char    rdata[IPMI_MAX_MSG_LENGTH];
data/openipmi-2.0.29/lanserv/lanserv.c:315:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data+7, rsp.msg.data, rsp.msg.data_len);
data/openipmi-2.0.29/lanserv/lanserv.c:335:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[256];
data/openipmi-2.0.29/lanserv/lanserv.c:380:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ipmi_fd = open(ipmi_dev, O_RDWR);
data/openipmi-2.0.29/lanserv/lanserv.c:382:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ipmi_fd = open("/dev/ipmidev/0", O_RDWR);
data/openipmi-2.0.29/lanserv/lanserv.c:384:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    ipmi_fd = open("/dev/ipmi0", O_RDWR);
data/openipmi-2.0.29/lanserv/lanserv.c:458:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    pos += sprintf(str + pos, " %2.2x", msg->data[i]);
data/openipmi-2.0.29/lanserv/lanserv.c:708:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(cmd, "exec ");
data/openipmi-2.0.29/lanserv/lanserv.c:718:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *args[4] = { "/bin/sh", "-c", cmd, NULL };
data/openipmi-2.0.29/lanserv/lanserv_config.c:77:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         buf[MAX_CONFIG_LINE];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:262:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		pos += sprintf(str + pos, " %2.2x",
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:263:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			       ((unsigned char *) vec[i].iov_base)[j]);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:275:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		 unsigned int payload, unsigned char *data, unsigned int len,
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:276:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		 unsigned char iana[3], unsigned int payload_id)
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:295:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pos, data, len);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:388:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tpos, iana, 3);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:568:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rdata[17];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:578:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rdata + 1, lan->guid, 16);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:719:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *adata, data[18];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:768:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data + 2, adata + start, size);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:854:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tsid[4];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:855:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tseq[4];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:975:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(session->src_addr, msg->src_addr, msg->src_len);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1388:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&lan->lanparm_rollback, &lan->lanparm,
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1399:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&lan->lanparm_rollback, &lan->lanparm,
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1422:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(lan->lanparm.ip_addr, msg->data+2, 4);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1446:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(lan->lanparm.mac_addr, msg->data+2, 6);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1455:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(lan->lanparm.subnet_mask, msg->data+2, 4);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1464:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(lan->lanparm.ipv4_hdr_parms, msg->data+2, 3);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1472:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(lan->lanparm.default_gw_ip_addr, msg->data+2, 4);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1481:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(lan->lanparm.default_gw_mac_addr, msg->data+2, 6);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1490:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(lan->lanparm.backup_gw_ip_addr, msg->data+2, 4);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1499:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(lan->lanparm.backup_gw_mac_addr, msg->data+2, 6);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1512:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(lan->lanparm.vlan_id, msg->data+2, 2);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1524:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(lan->lanparm.max_priv_for_cipher_suite, msg->data+2, 9);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1542:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char databytes[5];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1741:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rdata + 2, data, length);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1917:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       idata[74];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1928:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+8, a->rem_rand, 16);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1929:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+24, a->rand, 16);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1930:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+40, lan->guid, 16);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1933:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+58, a->username, idata[57]);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1942:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+0, a->rem_rand, 16);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1943:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+16, a->rand, 16);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1946:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+34, a->username, idata[33]);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1966:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       idata[38];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1968:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       integ[20];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1975:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+0, a->rand, 16);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1979:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+22, a->username, idata[21]);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1994:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       idata[36];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:1997:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       integ[20];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2002:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+0, a->rem_rand, 16);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2004:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+20, lan->guid, 16);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2007:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+*data_len, integ, a->integ_len);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2063:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char integ[20];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2069:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pos+(*data_len), integ, a->integ_len);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2077:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char integ[20];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2225:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(d, *pos, *data_len);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2294:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(d, msg->data+16, l);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2397:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[36];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2514:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(session->src_addr, msg->src_addr, msg->src_len);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2585:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[64];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2590:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char username[17];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2607:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(session->auth_data.rem_rand, msg->data+8, 16);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2636:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(username, msg->data+28, name_len);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2647:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(session->auth_data.username, username, 16);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2669:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+8, session->auth_data.rand, 16);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2670:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+24, lan->guid, 16);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2691:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[32];
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2830:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg->rmcpp.iana, msg->data + 1, 3);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:2945:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg->rmcp.authcode_data, msg->data + 8, 16);
data/openipmi-2.0.29/lanserv/lanserv_ipmi.c:3088:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lan->lanparm.max_priv_for_cipher_suite, data, len);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:123:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *trg_reset[NUM_BOARDS] =
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:136:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *trg_power[NUM_BOARDS] =
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:149:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *trg_present[NUM_BOARDS] =
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:164:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pow_off_request[NUM_BOARDS] =
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:177:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pow_off_ready[NUM_BOARDS] =
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:292:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char fru[BOARD_FRU_SIZE];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:309:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char chassis_fru[CHASSIS_FRU_SIZE];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:324:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char sernum[10];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:325:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char sysmac[17];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:327:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char board_ipmb[NUM_BOARDS] = { 1, 2, 3, 4, 5, 6 };
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:396:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(e->dev, O_RDONLY);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:412:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(e->dev, O_RDONLY);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:415:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(add_dev, "w");
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:420:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(e->dev, O_RDONLY);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:440:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(e->dev, O_RDONLY);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:469:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(e->dev, O_WRONLY);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:499:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(fname, "w");
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:514:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[80];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:517:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(fname, "r");
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:541:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[80];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:544:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(fname, "r");
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1053:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[72];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1120:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fname[100];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1125:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fname, "/sys/class/wixpmbus/CLEAR_FAULT_%d", num);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1253:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(fru + chinfo, chassis_fru + chassis_chinfo,
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1278:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mysernum[21];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1293:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(fru + brdinfo + brdsernum_offset + 1, mysernum, 20);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1315:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac[29];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1322:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(fru + brdinfo + mac_offset + 1, mac, 28);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1618:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sernum, chassis_fru + chassis_chinfo + sernum_offset
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1628:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sysmac, chassis_fru + chassis_brdinfo + sysmac_offset + 14, 16);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1873:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char (*board_valids)[NUM_BOARDS];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1889:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char switch_temp_sensor_valids[2];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1905:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char board_temp_sensor_last_oor[NUM_BOARDS];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1906:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char board_temp_sensor_valids[2][NUM_BOARDS];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1940:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char board_mb_sensor_valids[1][NUM_BOARDS];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1969:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char board_front_sensor_valids[1][NUM_BOARDS];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2013:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char switch_sensor_valids[11];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2047:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char board_sensor_valids[8][NUM_BOARDS];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2089:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char filename[100];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char cfilename[100];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2106:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(cfilename, "w");
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2190:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char cpu_errors[NUM_BOARDS];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2206:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    unsigned char data[2];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2256:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *fan_fail_led[4]  =
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2275:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fan_fail[8];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2303:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char filename[50];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2306:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(filename, "/sys/class/astfan/fan%u_input", i);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2344:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char filename[50];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2346:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(filename, "/sys/class/astfan/pwm%u", i);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2628:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char board_fru_data[2048];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2635:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(BOARD_FRU_FILE, O_RDONLY);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2680:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmd[100];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2968:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ast_fd = open("/dev/event", O_RDWR);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:3148:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	wdt_fd = open("/dev/watchdog", O_WRONLY);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:3179:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char lver[4];
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:3285:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[13];
data/openipmi-2.0.29/lanserv/persist.c:297:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(fname, "r");
data/openipmi-2.0.29/lanserv/persist.c:406:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(fname, "w");
data/openipmi-2.0.29/lanserv/persist.c:500:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pi->data, data, len);
data/openipmi-2.0.29/lanserv/persist.c:563:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*data, pi->data, pi->dval);
data/openipmi-2.0.29/lanserv/sdrcomp/sdrcomp.c:1289:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAX_SDR_LINE];
data/openipmi-2.0.29/lanserv/sdrcomp/sdrcomp.c:1469:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char str[IPMI_MAX_STR_LEN];
data/openipmi-2.0.29/lanserv/sdrcomp/sdrcomp.c:1489:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sdr + t[i].pos - 1, str, out_len);
data/openipmi-2.0.29/lanserv/sdrcomp/sdrcomp.c:1597:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAX_SDR_LINE];
data/openipmi-2.0.29/lanserv/sdrcomp/sdrcomp.c:1694:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    f2 = fopen(nfilename, "r");
data/openipmi-2.0.29/lanserv/sdrcomp/sdrcomp.c:1825:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[IPMI_MAX_STR_LEN + 1];
data/openipmi-2.0.29/lanserv/sdrcomp/sdrcomp.c:1998:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(argv[argn], "r");
data/openipmi-2.0.29/lanserv/sdrcomp/sdrcomp.c:2019:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	outfile = fopen(outfname, "w");
data/openipmi-2.0.29/lanserv/serial_ipmi.c:80:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char hex2char[16] = {
data/openipmi-2.0.29/lanserv/serial_ipmi.c:137:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(msgd + 6, msg->data, msg->len);
data/openipmi-2.0.29/lanserv/serial_ipmi.c:160:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char recv_chars[RA_MAX_CHARS_SIZE];
data/openipmi-2.0.29/lanserv/serial_ipmi.c:170:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[RA_MAX_CHARS_SIZE];
data/openipmi-2.0.29/lanserv/serial_ipmi.c:201:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char real_o[IPMI_SIM_MAX_MSG_LENGTH + 1];
data/openipmi-2.0.29/lanserv/serial_ipmi.c:298:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char msg[IPMI_SIM_MAX_MSG_LENGTH + 7];
data/openipmi-2.0.29/lanserv/serial_ipmi.c:336:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char recv_msg[IPMI_SIM_MAX_MSG_LENGTH + 4];
data/openipmi-2.0.29/lanserv/serial_ipmi.c:442:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[(IPMI_SIM_MAX_MSG_LENGTH + 7) * 2];
data/openipmi-2.0.29/lanserv/serial_ipmi.c:443:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char msg[IPMI_SIM_MAX_MSG_LENGTH + 7];
data/openipmi-2.0.29/lanserv/serial_ipmi.c:510:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char recv_chars[TM_MAX_CHARS_SIZE];
data/openipmi-2.0.29/lanserv/serial_ipmi.c:520:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[TM_MAX_CHARS_SIZE];
data/openipmi-2.0.29/lanserv/serial_ipmi.c:576:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char o[IPMI_SIM_MAX_MSG_LENGTH];
data/openipmi-2.0.29/lanserv/serial_ipmi.c:752:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char recv_msg[IPMI_SIM_MAX_MSG_LENGTH + 4];
data/openipmi-2.0.29/lanserv/serial_ipmi.c:900:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[(IPMI_SIM_MAX_MSG_LENGTH + 7) * 2];
data/openipmi-2.0.29/lanserv/serial_ipmi.c:929:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[3];
data/openipmi-2.0.29/lanserv/serial_ipmi.c:948:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[3];
data/openipmi-2.0.29/lanserv/serial_ipmi.c:1002:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[5];
data/openipmi-2.0.29/lanserv/serial_ipmi.c:1082:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rdata + 1, pp_oem_chars, 3);
data/openipmi-2.0.29/lanserv/serial_ipmi.c:1096:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rdata + 1, pp_oem_chars, 3);
data/openipmi-2.0.29/lanserv/serv.c:92:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(nmsg->data, data, len);
data/openipmi-2.0.29/lanserv/serv.c:162:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(nmsg, msg, sizeof(*nmsg));
data/openipmi-2.0.29/lanserv/serv.c:165:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(nmsg->src_addr, msg->src_addr, msg->src_len);
data/openipmi-2.0.29/lanserv/serv.c:168:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(nmsg->data, msg->data, msg->len);
data/openipmi-2.0.29/lanserv/serv.c:172:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char    msgd[36];
data/openipmi-2.0.29/lanserv/serv.c:264:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    pos += sprintf(str + pos, " %ld.%6.6ld", tv.tv_sec, tv.tv_usec);
data/openipmi-2.0.29/lanserv/serv.c:268:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	pos += sprintf(str + pos, " %2.2x", data[i]);
data/openipmi-2.0.29/lanserv/sol.c:111:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char inbuf[SOL_INBUF_SIZE];
data/openipmi-2.0.29/lanserv/sol.c:115:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char outbuf[SOL_OUTBUF_SIZE];
data/openipmi-2.0.29/lanserv/sol.c:251:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char     str[64];
data/openipmi-2.0.29/lanserv/sol.c:262:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(lck_file, O_RDONLY)) >= 0) {
data/openipmi-2.0.29/lanserv/sol.c:287:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    fd = open(lck_file, O_WRONLY | O_CREAT | O_EXCL, 0666);
data/openipmi-2.0.29/lanserv/sol.c:490:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    sd->fd = open(sol->device, O_NONBLOCK | O_NOCTTY | O_RDWR);
data/openipmi-2.0.29/lanserv/sol.c:790:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dest + to_copy, sd->history, sd->history_end + 1);
data/openipmi-2.0.29/lanserv/sol.c:795:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, sd->history + start, to_copy);
data/openipmi-2.0.29/lanserv/sol.c:796:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest + size, end_history_msg, endmsg_size);
data/openipmi-2.0.29/lanserv/sol.c:877:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dmsg->src_addr, msg->src_addr, msg->src_len);
data/openipmi-2.0.29/lanserv/sol.c:1029:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[SOL_OUTBUF_SIZE + 4];
data/openipmi-2.0.29/lanserv/sol.c:1043:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data + 4, sd->outbuf, size);
data/openipmi-2.0.29/lanserv/sol.c:1056:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[SOL_OUTBUF_SIZE + 4];
data/openipmi-2.0.29/lanserv/sol.c:1102:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sd->inbuf, sol_telnet_initseq, len);
data/openipmi-2.0.29/lanserv/sol.c:1207:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sd->inbuf + sd->inlen, data, len);
data/openipmi-2.0.29/lanserv/sol.c:1268:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MAX_HISTORY_SEND + 4];
data/openipmi-2.0.29/lanserv/sol.c:1287:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data + 4, sd->history_copy + sd->history_pos, to_send);
data/openipmi-2.0.29/lanserv/sol.c:1301:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[SOL_OUTBUF_SIZE + 4];
data/openipmi-2.0.29/lanserv/sol.c:1442:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sd->inbuf, sd->inbuf + rv, sd->inlen - rv);
data/openipmi-2.0.29/lanserv/sol.c:1469:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sd->history + sd->history_end + 1, buf, to_copy);
data/openipmi-2.0.29/lanserv/sol.c:1479:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sd->history + sd->history_end + 1, buf, len);
data/openipmi-2.0.29/lanserv/sol.c:1565:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[128];
data/openipmi-2.0.29/lanserv/sol.c:1598:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sd->outbuf + sd->outlen, buf, rv);
data/openipmi-2.0.29/lanserv/sol.c:1831:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(sol->backupfile, "w");
data/openipmi-2.0.29/lanserv/sol.c:1887:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    FILE *f = fopen(sol->backupfile, "r");
data/openipmi-2.0.29/lib/aes_cbc.c:46:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char k2[16];
data/openipmi-2.0.29/lib/aes_cbc.c:62:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(info->k2, ipmi_rmcpp_auth_get_k2(ainfo, &k2len), 16);
data/openipmi-2.0.29/lib/aes_cbc.c:117:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(d, *payload, *payload_len);
data/openipmi-2.0.29/lib/aes_cbc.c:199:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(d, p, l);
data/openipmi-2.0.29/lib/chassis.c:104:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[1];
data/openipmi-2.0.29/lib/chassis.c:196:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[1];
data/openipmi-2.0.29/lib/control.c:129:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char id[CONTROL_ID_LEN];
data/openipmi-2.0.29/lib/control.c:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IPMI_CONTROL_NAME_LEN+1];
data/openipmi-2.0.29/lib/control.c:319:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               id[33];
data/openipmi-2.0.29/lib/control.c:885:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(new_array, controls->controls_by_idx,
data/openipmi-2.0.29/lib/control.c:1442:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(id, control->id, clen);
data/openipmi-2.0.29/lib/control.c:1462:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(control->id, id, length);
data/openipmi-2.0.29/lib/control.c:1882:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rv->lights, settings->lights,
data/openipmi-2.0.29/lib/domain.c:113:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char                msg_data[IPMI_MAX_MSG_LENGTH];
data/openipmi-2.0.29/lib/domain.c:147:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IPMI_DOMAIN_NAME_LEN+1];
data/openipmi-2.0.29/lib/domain.c:230:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char con_ipmb_addr[MAX_CONS][MAX_IPMI_USED_CHANNELS];
data/openipmi-2.0.29/lib/domain.c:265:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             chan_set[MAX_IPMI_USED_CHANNELS];
data/openipmi-2.0.29/lib/domain.c:1753:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         addr_data[sizeof(ipmi_addr_t)];
data/openipmi-2.0.29/lib/domain.c:1787:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nmcs, tab->mcs, sizeof(ipmi_mc_t *) * tab->size);
data/openipmi-2.0.29/lib/domain.c:1903:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         addr_data[sizeof(ipmi_addr_t)];
data/openipmi-2.0.29/lib/domain.c:1950:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        addr_data[sizeof(ipmi_addr_t)];
data/openipmi-2.0.29/lib/domain.c:2066:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rspi->addr, &orspi->addr, orspi->addr_len);
data/openipmi-2.0.29/lib/domain.c:2215:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&nmsg->rsp_item->addr, addr, addr_len);
data/openipmi-2.0.29/lib/domain.c:2265:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(nmsg->msg.data, msg->data, msg->data_len);
data/openipmi-2.0.29/lib/domain.c:4629:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char cmd_data[1];
data/openipmi-2.0.29/lib/domain.c:4668:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char cmd_data[1];
data/openipmi-2.0.29/lib/domain.c:5267:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char old_addr[MAX_IPMI_USED_CHANNELS];
data/openipmi-2.0.29/lib/domain.c:5764:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name, domain->name, slen);
data/openipmi-2.0.29/lib/entity.c:102:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char id[ENTITY_ID_LEN];
data/openipmi-2.0.29/lib/entity.c:303:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IPMI_ENTITY_NAME_LEN+1];
data/openipmi-2.0.29/lib/entity.c:1010:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name, ent->name, slen);
data/openipmi-2.0.29/lib/entity.c:2085:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[1];
data/openipmi-2.0.29/lib/entity.c:3904:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(new_dlrs, infos->dlrs, sizeof(dlr_info_t *) * infos->len);
data/openipmi-2.0.29/lib/entity.c:3905:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(new_found, infos->found,
data/openipmi-2.0.29/lib/entity.c:3922:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_dlr, dlr, sizeof(*new_dlr));
data/openipmi-2.0.29/lib/entity.c:3974:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(new_cent, found->cent,
data/openipmi-2.0.29/lib/entity.c:4343:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&found->ent->pending_info, infos.dlrs[i],
data/openipmi-2.0.29/lib/entity.c:4352:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(&found->ent->pending_info, infos.dlrs[i],
data/openipmi-2.0.29/lib/entity.c:4361:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&found->ent->pending_info, infos.dlrs[i],
data/openipmi-2.0.29/lib/entity.c:4374:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&found->ent->pending_info, infos.dlrs[i],
data/openipmi-2.0.29/lib/entity.c:4449:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(old_infos, &infos, sizeof(infos));
data/openipmi-2.0.29/lib/entity.c:5116:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(id, ent->info.id, clen);
data/openipmi-2.0.29/lib/entity.c:5140:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ent->info.id, id, length);
data/openipmi-2.0.29/lib/event.c:55:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0];
data/openipmi-2.0.29/lib/event.c:83:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rv->data, data, data_len);
data/openipmi-2.0.29/lib/event.c:162:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, event->data+offset, len);
data/openipmi-2.0.29/lib/fru.c:110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IPMI_FRU_NAME_LEN+1];
data/openipmi-2.0.29/lib/fru.c:183:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char iname[IPMI_FRU_NAME_LEN+1];
data/openipmi-2.0.29/lib/fru.c:1079:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(fru->data+fru->curr_pos, data+2, count);
data/openipmi-2.0.29/lib/fru.c:1118:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cmd_data[4];
data/openipmi-2.0.29/lib/fru.c:1219:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char    cmd_data[1];
data/openipmi-2.0.29/lib/fru.c:1397:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MAX_FRU_DATA_WRITE+4];
data/openipmi-2.0.29/lib/fru.c:1421:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+3, fru->data+offset, length);
data/openipmi-2.0.29/lib/fru.c:1634:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name, fru->name, slen);
data/openipmi-2.0.29/lib/fru_spd_decode.c:93:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          partNumber[19];
data/openipmi-2.0.29/lib/fru_spd_decode.c:94:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rawData[128];
data/openipmi-2.0.29/lib/fru_spd_decode.c:245:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(spd_info->rawData, spd_data, 128);
data/openipmi-2.0.29/lib/fru_spd_decode.c:278:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(spd_info->partNumber, "Unknown");
data/openipmi-2.0.29/lib/hmac.c:49:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char k[20];
data/openipmi-2.0.29/lib/hmac.c:75:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(info->k, k, 20);
data/openipmi-2.0.29/lib/hmac.c:104:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(info->k, k, 16);
data/openipmi-2.0.29/lib/hmac.c:165:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char integ[20];
data/openipmi-2.0.29/lib/hmac.c:177:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p+l, integ, ilen);
data/openipmi-2.0.29/lib/hmac.c:195:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char new_integ[20];
data/openipmi-2.0.29/lib/ipmi.c:611:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *largs[16];
data/openipmi-2.0.29/lib/ipmi.c:1083:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char pet_ack[12];
data/openipmi-2.0.29/lib/ipmi.c:1118:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  edata[17];
data/openipmi-2.0.29/lib/ipmi.c:1163:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(edata+14, data+31, 3); /* Event data 1-3 */
data/openipmi-2.0.29/lib/ipmi.c:1175:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pet_ack+9, data+31, 3); /* Event data 1-3 */
data/openipmi-2.0.29/lib/ipmi.c:1235:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_item->data, old_item->data, old_item->msg.data_len);
data/openipmi-2.0.29/lib/ipmi.c:1250:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&rspi->addr, addr, addr_len);
data/openipmi-2.0.29/lib/ipmi.c:1253:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rspi->data, msg->data, msg->data_len);
data/openipmi-2.0.29/lib/ipmi.c:1273:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rspi->data, msg->data, msg->data_len);
data/openipmi-2.0.29/lib/ipmi_lan.c:120:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char         data[IPMI_MAX_MSG_LENGTH];
data/openipmi-2.0.29/lib/ipmi_lan.c:156:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char my_rand[16];
data/openipmi-2.0.29/lib/ipmi_lan.c:158:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mgsys_rand[16];
data/openipmi-2.0.29/lib/ipmi_lan.c:160:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mgsys_guid[16];
data/openipmi-2.0.29/lib/ipmi_lan.c:162:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sik[20];
data/openipmi-2.0.29/lib/ipmi_lan.c:164:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char k1[20];
data/openipmi-2.0.29/lib/ipmi_lan.c:166:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char k2[20];
data/openipmi-2.0.29/lib/ipmi_lan.c:173:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          *ip_addr_str[MAX_IP_ADDR];
data/openipmi-2.0.29/lib/ipmi_lan.c:174:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          *ip_port_str[MAX_IP_ADDR];
data/openipmi-2.0.29/lib/ipmi_lan.c:178:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char username[IPMI_USERNAME_MAX];
data/openipmi-2.0.29/lib/ipmi_lan.c:180:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char password[IPMI_PASSWORD_MAX];
data/openipmi-2.0.29/lib/ipmi_lan.c:186:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char bmc_key[IPMI_PASSWORD_MAX];
data/openipmi-2.0.29/lib/ipmi_lan.c:225:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *lan_stat_names[NUM_STATS] =
data/openipmi-2.0.29/lib/ipmi_lan.c:303:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char              slave_addr[MAX_IPMI_USED_CHANNELS];
data/openipmi-2.0.29/lib/ipmi_lan.c:342:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char              oem_iana[3];
data/openipmi-2.0.29/lib/ipmi_lan.c:350:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char              challenge_string[16];
data/openipmi-2.0.29/lib/ipmi_lan.c:362:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char         data[LAN_MAX_RAW_MSG];
data/openipmi-2.0.29/lib/ipmi_lan.c:447:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmsg, msg->data, msg->data_len);
data/openipmi-2.0.29/lib/ipmi_lan.c:483:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rspi->data, data, data_len);
data/openipmi-2.0.29/lib/ipmi_lan.c:522:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  iana[3];
data/openipmi-2.0.29/lib/ipmi_lan.c:560:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char  iana[3],
data/openipmi-2.0.29/lib/ipmi_lan.c:571:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(e->iana, iana, 3);
data/openipmi-2.0.29/lib/ipmi_lan.c:603:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iana[3];
data/openipmi-2.0.29/lib/ipmi_lan.c:626:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				       unsigned char               iana[3],
data/openipmi-2.0.29/lib/ipmi_lan.c:636:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(e->iana, iana, 3);
data/openipmi-2.0.29/lib/ipmi_lan.c:660:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iana[3];
data/openipmi-2.0.29/lib/ipmi_lan.c:719:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					unsigned char                iana[3],
data/openipmi-2.0.29/lib/ipmi_lan.c:729:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(e->iana, iana, 3);
data/openipmi-2.0.29/lib/ipmi_lan.c:753:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iana[3];
data/openipmi-2.0.29/lib/ipmi_lan.c:827:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				  unsigned char          iana[3],
data/openipmi-2.0.29/lib/ipmi_lan.c:837:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(e->iana, iana, 3);
data/openipmi-2.0.29/lib/ipmi_lan.c:1674:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmsg, oem_iana, 3);
data/openipmi-2.0.29/lib/ipmi_lan.c:1790:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  data[IPMI_MAX_LAN_LEN+IPMI_LAN_MAX_HEADER];
data/openipmi-2.0.29/lib/ipmi_lan.c:1797:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  oem_iana[3] = {0, 0, 0};
data/openipmi-2.0.29/lib/ipmi_lan.c:1831:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(oem_iana, rmcpp_addr->oem_iana, 3);
data/openipmi-2.0.29/lib/ipmi_lan.c:1834:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(oem_iana, lan->oem_iana, 3);
data/openipmi-2.0.29/lib/ipmi_lan.c:1885:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf1[32], buf2[32];
data/openipmi-2.0.29/lib/ipmi_lan.c:2498:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rspi->addr, &lan->seq_table[seq].orig_addr,
data/openipmi-2.0.29/lib/ipmi_lan.c:2502:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rspi->addr,
data/openipmi-2.0.29/lib/ipmi_lan.c:2634:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              addr_data[sizeof(ipmi_addr_t)];
data/openipmi-2.0.29/lib/ipmi_lan.c:2635:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              addr_data2[sizeof(ipmi_addr_t)];
data/openipmi-2.0.29/lib/ipmi_lan.c:2661:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf1[32], buf2[32];
data/openipmi-2.0.29/lib/ipmi_lan.c:2711:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(lan->seq_table[seq].addr), addr, addr_len);
data/openipmi-2.0.29/lib/ipmi_lan.c:2715:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(lan->seq_table[seq].data, msg->data, msg->data_len);
data/openipmi-2.0.29/lib/ipmi_lan.c:2723:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(lan->seq_table[seq].orig_addr), orig_addr, orig_addr_len);
data/openipmi-2.0.29/lib/ipmi_lan.c:2991:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rspi->addr, &lan->seq_table[seq].orig_addr,
data/openipmi-2.0.29/lib/ipmi_lan.c:3018:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char oem_iana[3] = { 0, 0, 0 };
data/openipmi-2.0.29/lib/ipmi_lan.c:3054:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(oem_iana, tmsg, 3);
data/openipmi-2.0.29/lib/ipmi_lan.c:3463:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[IPMI_MAX_LAN_LEN];
data/openipmi-2.0.29/lib/ipmi_lan.c:3680:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(q_item->addr), addr, addr_len);
data/openipmi-2.0.29/lib/ipmi_lan.c:3684:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(q_item->data, msg->data, msg->data_len);
data/openipmi-2.0.29/lib/ipmi_lan.c:3804:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char buf[INET_ADDRSTRLEN];
data/openipmi-2.0.29/lib/ipmi_lan.c:3816:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char buf[INET6_ADDRSTRLEN];
data/openipmi-2.0.29/lib/ipmi_lan.c:3850:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char                data[4];
data/openipmi-2.0.29/lib/ipmi_lan.c:3993:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&rspi->addr, &lan->seq_table[i].orig_addr,
data/openipmi-2.0.29/lib/ipmi_lan.c:3997:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&rspi->addr, &(lan->seq_table[i].addr),
data/openipmi-2.0.29/lib/ipmi_lan.c:4373:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char		 data[1];
data/openipmi-2.0.29/lib/ipmi_lan.c:4691:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     data[32];
data/openipmi-2.0.29/lib/ipmi_lan.c:4819:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char                data[IPMI_MAX_MSG_LENGTH];
data/openipmi-2.0.29/lib/ipmi_lan.c:4830:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+2, lan->challenge_string, 16);
data/openipmi-2.0.29/lib/ipmi_lan.c:4875:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(lan->challenge_string, msg->data+5, 16);
data/openipmi-2.0.29/lib/ipmi_lan.c:4904:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char                data[IPMI_MAX_MSG_LENGTH];
data/openipmi-2.0.29/lib/ipmi_lan.c:4918:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+1, lan->cparm.username, IPMI_USERNAME_MAX);
data/openipmi-2.0.29/lib/ipmi_lan.c:4959:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lan->oem_iana, msg->data+5, 3);
data/openipmi-2.0.29/lib/ipmi_lan.c:4987:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(lan->oem_iana, msg->data+5, 3);
data/openipmi-2.0.29/lib/ipmi_lan.c:5102:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char                data[2];
data/openipmi-2.0.29/lib/ipmi_lan.c:5233:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s_ip_addrs[MAX_IP_ADDR][20];
data/openipmi-2.0.29/lib/ipmi_lan.c:5234:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s_ports[MAX_IP_ADDR][10];
data/openipmi-2.0.29/lib/ipmi_lan.c:5235:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *paddrs[MAX_IP_ADDR], *pports[MAX_IP_ADDR];
data/openipmi-2.0.29/lib/ipmi_lan.c:5244:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(s_ip_addrs[i], "%u.%u.%u.%u", *p, *(p+1), *(p+2), *(p+3));
data/openipmi-2.0.29/lib/ipmi_lan.c:5245:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(s_ports[i], "%u", ports[i]);
data/openipmi-2.0.29/lib/ipmi_lan.c:5460:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               *tports[MAX_IP_ADDR];
data/openipmi-2.0.29/lib/ipmi_lan.c:5490:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(cparm.password, parms[i].parm_data, parms[i].parm_data_len);
data/openipmi-2.0.29/lib/ipmi_lan.c:5497:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(cparm.username, parms[i].parm_data, parms[i].parm_data_len);
data/openipmi-2.0.29/lib/ipmi_lan.c:5563:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(cparm.bmc_key, parms[i].parm_data, parms[i].parm_data_len);
data/openipmi-2.0.29/lib/ipmi_lan.c:5632:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(cparm.ip_addr[count].s_ipsock), res0->ai_addr,
data/openipmi-2.0.29/lib/ipmi_lan.c:5652:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        paddr->sin_port = htons(atoi(ports[i]));
data/openipmi-2.0.29/lib/ipmi_lan.c:5656:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(paddr->sin_addr), ent->h_addr_list[0], ent->h_length);
data/openipmi-2.0.29/lib/ipmi_lan.c:5928:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            *str_addr[2];	/* parms 0, 1 */
data/openipmi-2.0.29/lib/ipmi_lan.c:5929:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            *str_port[2];	/* parms 2, 3 */
data/openipmi-2.0.29/lib/ipmi_lan.c:5934:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            username[16];	/* parm 6 */
data/openipmi-2.0.29/lib/ipmi_lan.c:5937:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            password[20];	/* parm 7 */
data/openipmi-2.0.29/lib/ipmi_lan.c:5945:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            bmc_key[20];	/* parm 12 */
data/openipmi-2.0.29/lib/ipmi_lan.c:6124:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(largs->username, cparm->username, cparm->username_len);
data/openipmi-2.0.29/lib/ipmi_lan.c:6129:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(largs->password, cparm->password, cparm->password_len);
data/openipmi-2.0.29/lib/ipmi_lan.c:6139:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(largs->bmc_key, cparm->bmc_key, cparm->bmc_key_len);
data/openipmi-2.0.29/lib/ipmi_lan.c:6234:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(rval, data, *len);
data/openipmi-2.0.29/lib/ipmi_lan.c:6438:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*dest, value, nlen);
data/openipmi-2.0.29/lib/ipmi_lan.c:6712:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(largs->username, args[*curr_arg], len);
data/openipmi-2.0.29/lib/ipmi_lan.c:6720:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(largs->password, args[*curr_arg], len);
data/openipmi-2.0.29/lib/ipmi_lan.c:6843:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(largs->bmc_key, args[*curr_arg], len);
data/openipmi-2.0.29/lib/ipmi_payload.c:100:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmsg+6, msg->data, msg->data_len);
data/openipmi-2.0.29/lib/ipmi_payload.c:144:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmsg+pos, msg->data, msg->data_len);
data/openipmi-2.0.29/lib/ipmi_payload.c:230:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(ipmb_addr, ipmb2, sizeof(*ipmb_addr));
data/openipmi-2.0.29/lib/ipmi_payload.c:301:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(addr, orig_addr, orig_addr_len);
data/openipmi-2.0.29/lib/ipmi_payload.c:353:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&addr2, orig_addr, orig_addr_len);
data/openipmi-2.0.29/lib/ipmi_payload.c:386:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rspi->data, msg->data, msg->data_len);
data/openipmi-2.0.29/lib/ipmi_payload.c:390:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf1[32], buf2[32], buf3[32];
data/openipmi-2.0.29/lib/ipmi_payload.c:414:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         addr_data[sizeof(ipmi_addr_t)];
data/openipmi-2.0.29/lib/ipmi_payload.c:443:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char buf1[32], buf2[32], buf3[32];
data/openipmi-2.0.29/lib/ipmi_smi.c:134:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char              slave_addr[MAX_IPMI_USED_CHANNELS];
data/openipmi-2.0.29/lib/ipmi_smi.c:197:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[1];
data/openipmi-2.0.29/lib/ipmi_smi.c:290:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(cmd->addr), addr, addr_len);
data/openipmi-2.0.29/lib/ipmi_smi.c:394:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char devname[30];
data/openipmi-2.0.29/lib/ipmi_smi.c:398:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(devname, "/dev/ipmidev/%d", if_num);
data/openipmi-2.0.29/lib/ipmi_smi.c:399:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(devname, O_RDWR);
data/openipmi-2.0.29/lib/ipmi_smi.c:402:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(devname, "/dev/ipmi/%d", if_num);
data/openipmi-2.0.29/lib/ipmi_smi.c:403:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(devname, O_RDWR);
data/openipmi-2.0.29/lib/ipmi_smi.c:407:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(devname, "/dev/ipmi%d", if_num);
data/openipmi-2.0.29/lib/ipmi_smi.c:408:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    fd = open(devname, O_RDWR);
data/openipmi-2.0.29/lib/ipmi_smi.c:433:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf1[32], buf2[32];
data/openipmi-2.0.29/lib/ipmi_smi.c:452:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&myaddr, addr, addr_len);
data/openipmi-2.0.29/lib/ipmi_smi.c:698:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rspi->addr, &cmd->orig_addr, cmd->orig_addr_len);
data/openipmi-2.0.29/lib/ipmi_smi.c:701:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rspi->addr, (ipmi_addr_t *) recv->addr, recv->addr_len);
data/openipmi-2.0.29/lib/ipmi_smi.c:835:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[1];
data/openipmi-2.0.29/lib/ipmi_smi.c:862:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf1[32], buf2[32], buf3[32];
data/openipmi-2.0.29/lib/ipmi_smi.c:905:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char    data[IPMI_MAX_MSG_LENGTH];
data/openipmi-2.0.29/lib/ipmi_smi.c:947:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          addr_data[sizeof(ipmi_addr_t)];
data/openipmi-2.0.29/lib/ipmi_smi.c:948:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          addr_data2[sizeof(ipmi_addr_t)];
data/openipmi-2.0.29/lib/ipmi_smi.c:956:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addr, iaddr, addr_len);
data/openipmi-2.0.29/lib/ipmi_smi.c:993:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(&cmd->orig_addr, addr, addr_len);
data/openipmi-2.0.29/lib/ipmi_smi.c:1632:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       dummy[1];
data/openipmi-2.0.29/lib/ipmi_smi.c:1738:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    sargs->ifnum = atoi(args[*curr_arg]);
data/openipmi-2.0.29/lib/ipmi_sol.c:657:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[6];
data/openipmi-2.0.29/lib/ipmi_sol.c:1303:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, &qi->data[already_acked], copychars);
data/openipmi-2.0.29/lib/ipmi_sol.c:1372:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&new_packet_record->packet[PACKET_DATA],
data/openipmi-2.0.29/lib/ipmi_sol.c:1531:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[50];
data/openipmi-2.0.29/lib/ipmi_sol.c:1631:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char buf[50];
data/openipmi-2.0.29/lib/ipmi_sol.c:1722:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[50];
data/openipmi-2.0.29/lib/ipmi_sol.c:1918:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_tail->data, buf, count);
data/openipmi-2.0.29/lib/ipmi_sol.c:2595:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        pname[20];
data/openipmi-2.0.29/lib/ipmi_sol.c:2726:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[6];
data/openipmi-2.0.29/lib/ipmi_sol.c:2794:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[3];
data/openipmi-2.0.29/lib/ipmi_sol.c:2879:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[1];
data/openipmi-2.0.29/lib/ipmi_sol.c:2902:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *privilege_level[16] = {
data/openipmi-2.0.29/lib/ipmi_sol.c:2946:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[1];
data/openipmi-2.0.29/lib/ipmi_sol.c:2970:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[3];
data/openipmi-2.0.29/lib/ipmi_sol.c:3011:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[3];
data/openipmi-2.0.29/lib/ipmi_sol.c:3079:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[4];
data/openipmi-2.0.29/lib/ipmi_sol.c:3141:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[1];
data/openipmi-2.0.29/lib/ipmi_sol.c:3317:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out_data, msg->data, msg->data_len);
data/openipmi-2.0.29/lib/ipmi_sol.c:3587:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pdata, packet, data_len);
data/openipmi-2.0.29/lib/lanparm.c:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IPMI_LANPARM_NAME_LEN];
data/openipmi-2.0.29/lib/lanparm.c:235:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name, lanparm->name, slen);
data/openipmi-2.0.29/lib/lanparm.c:523:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char           data[4];
data/openipmi-2.0.29/lib/lanparm.c:635:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char        data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/lanparm.c:783:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(elem->data+2, data, data_len);
data/openipmi-2.0.29/lib/lanparm.c:819:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dest_ip_addr[4];
data/openipmi-2.0.29/lib/lanparm.c:820:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dest_mac_addr[6];
data/openipmi-2.0.29/lib/lanparm.c:850:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ip_addr[4];
data/openipmi-2.0.29/lib/lanparm.c:852:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mac_addr[6];
data/openipmi-2.0.29/lib/lanparm.c:853:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char subnet_mask[4];
data/openipmi-2.0.29/lib/lanparm.c:859:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char primary_rmcp_port[2];
data/openipmi-2.0.29/lib/lanparm.c:861:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char secondary_rmcp_port[2];
data/openipmi-2.0.29/lib/lanparm.c:868:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char default_gateway_ip_addr[4];
data/openipmi-2.0.29/lib/lanparm.c:869:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char default_gateway_mac_addr[6];
data/openipmi-2.0.29/lib/lanparm.c:871:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char backup_gateway_ip_addr[4];
data/openipmi-2.0.29/lib/lanparm.c:873:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char backup_gateway_mac_addr[6];
data/openipmi-2.0.29/lib/lanparm.c:875:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char community_string[18];
data/openipmi-2.0.29/lib/lanparm.c:885:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  cipher_suite_entries[16];
data/openipmi-2.0.29/lib/lanparm.c:887:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  max_priv_for_cipher_suite[16];
data/openipmi-2.0.29/lib/lanparm.c:937:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(((unsigned char *) lanc)+lp->offset, data, lp->length);
data/openipmi-2.0.29/lib/lanparm.c:943:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, ((unsigned char *) lanc)+lp->offset, lp->length);
data/openipmi-2.0.29/lib/lanparm.c:1200:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(da->dest_ip_addr, data+3, 4);
data/openipmi-2.0.29/lib/lanparm.c:1201:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(da->dest_mac_addr, data+7, 6);
data/openipmi-2.0.29/lib/lanparm.c:1217:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+3, da->dest_ip_addr, 4);
data/openipmi-2.0.29/lib/lanparm.c:1218:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+7, da->dest_mac_addr, 6);
data/openipmi-2.0.29/lib/lanparm.c:1308:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(lanc->cipher_suite_entries, data+1, 16);
data/openipmi-2.0.29/lib/lanparm.c:1612:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[1];
data/openipmi-2.0.29/lib/lanparm.c:1672:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[1];
data/openipmi-2.0.29/lib/lanparm.c:1700:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     data[1];
data/openipmi-2.0.29/lib/lanparm.c:1749:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     data[1];
data/openipmi-2.0.29/lib/lanparm.c:1776:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     data[MAX_IPMI_DATA_SIZE] = { 0, 0 };
data/openipmi-2.0.29/lib/lanparm.c:1859:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    && !(((unsigned char *) lanc)[lp->optional_offset])))
data/openipmi-2.0.29/lib/lanparm.c:1919:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/lanparm.c:1949:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lanc->alert_dest_type, olanc->alert_dest_type, 
data/openipmi-2.0.29/lib/lanparm.c:1959:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lanc->alert_dest_addr, olanc->alert_dest_addr, 
data/openipmi-2.0.29/lib/lanparm.c:2011:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[1];
data/openipmi-2.0.29/lib/lanparm.c:2117:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, lanc->n, l); \
data/openipmi-2.0.29/lib/lanparm.c:2128:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(lanc->n, data, l); \
data/openipmi-2.0.29/lib/lanparm.c:2151:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, lanc->n, l); \
data/openipmi-2.0.29/lib/lanparm.c:2164:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(lanc->n, data, l); \
data/openipmi-2.0.29/lib/lanparm.c:2332:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, lanc->s[set].n, l); \
data/openipmi-2.0.29/lib/lanparm.c:2346:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(lanc->s[set].n, data, l); \
data/openipmi-2.0.29/lib/mc.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                name[IPMI_MC_NAME_LEN+1];
data/openipmi-2.0.29/lib/mc.c:87:27:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define DEBUG_INFO(info) (memcpy(info->last, info->last+1,	\
data/openipmi-2.0.29/lib/mc.c:353:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char guid[16];
data/openipmi-2.0.29/lib/mc.c:400:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IPMI_MC_NAME_LEN+1];
data/openipmi-2.0.29/lib/mc.c:469:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name, mc->name, slen);
data/openipmi-2.0.29/lib/mc.c:702:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(mc->addr), addr, addr_len);
data/openipmi-2.0.29/lib/mc.c:1562:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/lib/mc.c:1645:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/lib/mc.c:1692:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  data[4];
data/openipmi-2.0.29/lib/mc.c:1771:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char         data[2];
data/openipmi-2.0.29/lib/mc.c:1943:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  data[4];
data/openipmi-2.0.29/lib/mc.c:2566:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          addr_data[sizeof(ipmi_addr_t)];
data/openipmi-2.0.29/lib/mc.c:3153:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mc->pending_devid.aux_fw_revision, rsp_data + 12, 4);
data/openipmi-2.0.29/lib/mc.c:3706:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(val, mc->devid.aux_fw_revision, sizeof(mc->devid.aux_fw_revision));
data/openipmi-2.0.29/lib/mc.c:3715:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(guid, mc->guid, 16);
data/openipmi-2.0.29/lib/mc.c:3722:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mc->guid, data, 16);
data/openipmi-2.0.29/lib/mc.c:3785:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(addr, &mc->addr, mc->addr_len);
data/openipmi-2.0.29/lib/mc.c:4020:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char             data[1];
data/openipmi-2.0.29/lib/mc.c:4166:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char vendor_id[3];
data/openipmi-2.0.29/lib/mc.c:4167:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char aux_info[2];
data/openipmi-2.0.29/lib/mc.c:4198:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(info->vendor_id, rsp->data+5, 3);
data/openipmi-2.0.29/lib/mc.c:4199:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(info->aux_info, rsp->data+8, 2);
data/openipmi-2.0.29/lib/mc.c:4214:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       data[1];
data/openipmi-2.0.29/lib/mc.c:4246:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rv, info, sizeof(*rv));
data/openipmi-2.0.29/lib/mc.c:4292:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, info->vendor_id, 3);
data/openipmi-2.0.29/lib/mc.c:4300:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, info->aux_info, 2);
data/openipmi-2.0.29/lib/mc.c:4366:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char         data[2];
data/openipmi-2.0.29/lib/mc.c:4426:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char         data[3];
data/openipmi-2.0.29/lib/mc.c:4439:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(info, access, sizeof(*info));
data/openipmi-2.0.29/lib/mc.c:4478:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rv, access, sizeof(*rv));
data/openipmi-2.0.29/lib/mc.c:4616:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[17];
data/openipmi-2.0.29/lib/mc.c:4620:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pw[20];
data/openipmi-2.0.29/lib/mc.c:4650:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rv, list, sizeof(*rv));
data/openipmi-2.0.29/lib/mc.c:4656:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rv->users, list->users, sizeof(ipmi_user_t) * list->idx);
data/openipmi-2.0.29/lib/mc.c:4743:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(list->users[list->idx].name, rsp->data+1, 16);
data/openipmi-2.0.29/lib/mc.c:4772:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char    data[1];
data/openipmi-2.0.29/lib/mc.c:4856:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   data[2];
data/openipmi-2.0.29/lib/mc.c:4903:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char    data[2];
data/openipmi-2.0.29/lib/mc.c:4947:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rv, user, sizeof(*rv));
data/openipmi-2.0.29/lib/mc.c:4983:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   data[2];
data/openipmi-2.0.29/lib/mc.c:5025:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   data[22];
data/openipmi-2.0.29/lib/mc.c:5036:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data+2, user->pw, 20);
data/openipmi-2.0.29/lib/mc.c:5040:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data+2, user->pw, 16);
data/openipmi-2.0.29/lib/mc.c:5073:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   data[17];
data/openipmi-2.0.29/lib/mc.c:5082:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+1, user->name, 16);
data/openipmi-2.0.29/lib/mc.c:5117:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   data[4];
data/openipmi-2.0.29/lib/mc.c:5224:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(name, user->name, *len);
data/openipmi-2.0.29/lib/mc.c:5233:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(user->name, name, len);
data/openipmi-2.0.29/lib/mc.c:5243:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(user->pw, pw, len);
data/openipmi-2.0.29/lib/mc.c:5255:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(user->pw, pw, len);
data/openipmi-2.0.29/lib/normal_fru.c:246:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(data+offset, s->raw_data, s->raw_len);
data/openipmi-2.0.29/lib/normal_fru.c:332:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tstr[IPMI_MAX_STR_LEN+1];
data/openipmi-2.0.29/lib/normal_fru.c:354:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(newval, str, len);
data/openipmi-2.0.29/lib/normal_fru.c:411:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          str[IPMI_MAX_STR_LEN+1];
data/openipmi-2.0.29/lib/normal_fru.c:430:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out->raw_data, in_start, out->raw_len);
data/openipmi-2.0.29/lib/normal_fru.c:438:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out->str, str, out->length);
data/openipmi-2.0.29/lib/normal_fru.c:461:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, in->str, clen);
data/openipmi-2.0.29/lib/normal_fru.c:526:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(newval, val->strings, sizeof(fru_string_t) * val->next);
data/openipmi-2.0.29/lib/normal_fru.c:587:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(newval, val->strings, sizeof(fru_string_t) * val->next);
data/openipmi-2.0.29/lib/normal_fru.c:636:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(n, v->strings, sizeof(fru_string_t) * v->len);
data/openipmi-2.0.29/lib/normal_fru.c:984:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(u->data, data+1, u->length);
data/openipmi-2.0.29/lib/normal_fru.c:1037:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, u->data, l);
data/openipmi-2.0.29/lib/normal_fru.c:1067:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(u->data, data, len);
data/openipmi-2.0.29/lib/normal_fru.c:1093:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+1, u->data, u->length);
data/openipmi-2.0.29/lib/normal_fru.c:1939:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(r->data, data+5, length);
data/openipmi-2.0.29/lib/normal_fru.c:2090:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, u->records[num].data, u->records[num].length);
data/openipmi-2.0.29/lib/normal_fru.c:2115:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, u->records[num].data+offset, length);
data/openipmi-2.0.29/lib/normal_fru.c:2155:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_data, data, length);
data/openipmi-2.0.29/lib/normal_fru.c:2230:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_recs, u->records, u->rec_len * sizeof(*new_recs));
data/openipmi-2.0.29/lib/normal_fru.c:2262:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_data, data, length);
data/openipmi-2.0.29/lib/normal_fru.c:2348:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_recs, u->records, u->rec_len * sizeof(*new_recs));
data/openipmi-2.0.29/lib/normal_fru.c:2371:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_data, data, length);
data/openipmi-2.0.29/lib/normal_fru.c:2420:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(u->records[num].data+offset, data, length);
data/openipmi-2.0.29/lib/normal_fru.c:2471:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_data, u->records[num].data, offset);
data/openipmi-2.0.29/lib/normal_fru.c:2472:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_data+offset+length, u->records[num].data+offset,
data/openipmi-2.0.29/lib/normal_fru.c:2476:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_data+offset, data, length);
data/openipmi-2.0.29/lib/normal_fru.c:2531:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_data, u->records[num].data, offset);
data/openipmi-2.0.29/lib/normal_fru.c:2532:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_data+offset, u->records[num].data+offset+length,
data/openipmi-2.0.29/lib/normal_fru.c:2575:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+5, elem->data, elem->length);
data/openipmi-2.0.29/lib/normal_fru.c:4435:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(d, u->records[record_num].data, u->records[record_num].length);
data/openipmi-2.0.29/lib/normal_fru.c:5079:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(sdata, data, arec->layout->min_elem_size);
data/openipmi-2.0.29/lib/normal_fru.c:5081:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(sdata, data, data_len);
data/openipmi-2.0.29/lib/normal_fru.c:6014:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rec->data, mr_data, layout->length);
data/openipmi-2.0.29/lib/normal_fru.c:6161:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rec->data, mr_data, layout->length);
data/openipmi-2.0.29/lib/normal_fru.c:6754:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 str[64];
data/openipmi-2.0.29/lib/normal_fru.c:6783:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(*data, str, len-1);
data/openipmi-2.0.29/lib/normal_fru.c:6786:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(*data, str, len);
data/openipmi-2.0.29/lib/normal_fru.c:6809:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(c, data, data_len);
data/openipmi-2.0.29/lib/normal_fru.c:6837:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*data, c, getset->layout->length);
data/openipmi-2.0.29/lib/normal_fru.c:6872:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(c, addr, addr_len);
data/openipmi-2.0.29/lib/normal_fru.c:6892:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          ipstr[19]; /* worst case size */
data/openipmi-2.0.29/lib/normal_fru.c:6895:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(ipstr, "ip:%d.%d.%d.%d", c[0], c[1], c[2], c[3]);
data/openipmi-2.0.29/lib/oem_atca.c:179:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 shelf_address[40];
data/openipmi-2.0.29/lib/oem_atca.c:629:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  data[4];
data/openipmi-2.0.29/lib/oem_atca.c:1022:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[6];
data/openipmi-2.0.29/lib/oem_atca.c:1405:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          name[10];
data/openipmi-2.0.29/lib/oem_atca.c:1440:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(name, "blue led");
data/openipmi-2.0.29/lib/oem_atca.c:1442:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(name, "led %d", num);
data/openipmi-2.0.29/lib/oem_atca.c:1494:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[3];
data/openipmi-2.0.29/lib/oem_atca.c:1537:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[3];
data/openipmi-2.0.29/lib/oem_atca.c:1644:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[2];
data/openipmi-2.0.29/lib/oem_atca.c:1754:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[3];
data/openipmi-2.0.29/lib/oem_atca.c:1943:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[2];
data/openipmi-2.0.29/lib/oem_atca.c:2061:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[4];
data/openipmi-2.0.29/lib/oem_atca.c:2152:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[3];
data/openipmi-2.0.29/lib/oem_atca.c:2348:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     data[2];
data/openipmi-2.0.29/lib/oem_atca.c:2510:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char val[4];
data/openipmi-2.0.29/lib/oem_atca.c:2657:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_frus, old_frus, sizeof(atca_fru_t *) * old_num_frus);
data/openipmi-2.0.29/lib/oem_atca.c:3118:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[1];
data/openipmi-2.0.29/lib/oem_atca.c:3282:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[5];
data/openipmi-2.0.29/lib/oem_atca.c:3353:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[5];
data/openipmi-2.0.29/lib/oem_atca.c:3421:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/oem_atca.c:3438:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+4, idata+1, idata_len-1);
data/openipmi-2.0.29/lib/oem_atca.c:3497:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       data[5];
data/openipmi-2.0.29/lib/oem_atca.c:3987:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char 		     data[5];
data/openipmi-2.0.29/lib/oem_atca.c:4188:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[13];
data/openipmi-2.0.29/lib/oem_atca.c:4501:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char 		 data[1];
data/openipmi-2.0.29/lib/oem_atca.c:4699:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[33];
data/openipmi-2.0.29/lib/oem_atca.c:4931:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char 		 data[1];
data/openipmi-2.0.29/lib/oem_atca_conn.c:176:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       data[64];
data/openipmi-2.0.29/lib/oem_atca_conn.c:309:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ainfo->addr.s_ipsock.s_addr4.sin_addr.s_addr, msg->data+10, 4);
data/openipmi-2.0.29/lib/oem_atca_conn.c:310:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ainfo->addr.s_ipsock.s_addr4.sin_port, msg->data+14, 2);
data/openipmi-2.0.29/lib/oem_atca_conn.c:321:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  data[12];
data/openipmi-2.0.29/lib/oem_atca_conn.c:335:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+4, asf_iana, 4);
data/openipmi-2.0.29/lib/oem_atca_conn.c:505:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char 		 data[2];
data/openipmi-2.0.29/lib/oem_atca_conn.c:611:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char buf[INET_ADDRSTRLEN];
data/openipmi-2.0.29/lib/oem_atca_conn.c:623:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char buf[INET6_ADDRSTRLEN];
data/openipmi-2.0.29/lib/oem_atca_conn.c:701:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char 		 data[2];
data/openipmi-2.0.29/lib/oem_atca_conn.c:742:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char        ipmb[MAX_IPMI_USED_CHANNELS];
data/openipmi-2.0.29/lib/oem_atca_conn.c:782:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char 		 data[1];
data/openipmi-2.0.29/lib/oem_atca_conn.c:922:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char 		 data[2];
data/openipmi-2.0.29/lib/oem_force_conn.c:51:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char        ipmb[MAX_IPMI_USED_CHANNELS];
data/openipmi-2.0.29/lib/oem_force_conn.c:135:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char                data[1];
data/openipmi-2.0.29/lib/oem_force_conn.c:191:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char    data[1];
data/openipmi-2.0.29/lib/oem_intel.c:391:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[13];
data/openipmi-2.0.29/lib/oem_kontron_conn.c:89:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char        ipmb[MAX_IPMI_USED_CHANNELS];
data/openipmi-2.0.29/lib/oem_kontron_conn.c:168:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char        ipmb[MAX_IPMI_USED_CHANNELS];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:1064:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char                  vals[4];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:1077:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char         extra_data[MAX_EXTRA_CMD_DATA];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:1194:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[3+MAX_EXTRA_CMD_DATA];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:1210:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+3, control_info->extra_data, control_info->extra_data_len);
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:1297:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char        data[3+MAX_EXTRA_CMD_DATA];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:1313:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(msg.data+3, control_info->extra_data, control_info->extra_data_len);
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:1969:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char        data[4];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:1984:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+3, control_info->vals, 1);
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:2059:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[4];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:2159:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[3];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:2214:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[4];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:2323:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char        data[3];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:2378:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[4];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:2487:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char        data[3];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:2544:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char        data[7];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:2559:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+3, control_info->vals, 4);
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:2592:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(control_info->vals, val, 4);
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:2654:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char        data[3];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:2844:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[4];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:2945:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[4];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:3022:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[5];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:3122:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[6];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:3292:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[5];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:3573:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   data[4];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:3637:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[6];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:3942:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[4];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:4332:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   data[4];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:4397:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[6];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:4525:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[5];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:4622:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[5];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:4719:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[4];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:4782:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[5];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5062:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *board_entity_str[MXP_TOTAL_BOARDS] =
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5088:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *ps_entity_str[MXP_POWER_SUPPLIES] =
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5097:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *fan_entity_str[MXP_FANS] =
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5425:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[4];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5482:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[4];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5590:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   data[3];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5649:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[4];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5741:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[6];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5850:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[3];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5931:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char        data[7];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5946:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+3, control_info->vals, 4);
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5977:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(control_info->vals, val, 4);
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:6247:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   data[3];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:6389:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[3];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:7026:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char         data[13];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:7703:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[5];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:7801:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[4];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:8644:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[3];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:8933:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         str[20];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:8959:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(str, "AMC%d", ipmi_mc_get_address(mc) + 1);
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:9016:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char        ipmb[MAX_IPMI_USED_CHANNELS];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:9048:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char		 data[3];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:9107:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char                data[5];
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:9144:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char                data[3];
data/openipmi-2.0.29/lib/oem_test.c:129:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char    data[13];
data/openipmi-2.0.29/lib/oem_test.c:240:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char    data[1];
data/openipmi-2.0.29/lib/oem_test.c:448:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char    data[1];
data/openipmi-2.0.29/lib/pef.c:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IPMI_PEF_NAME_LEN];
data/openipmi-2.0.29/lib/pef.c:255:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name, pef->name, slen);
data/openipmi-2.0.29/lib/pef.c:597:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       data[3];
data/openipmi-2.0.29/lib/pef.c:707:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/pef.c:851:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(elem->data+1, data, data_len);
data/openipmi-2.0.29/lib/pef.c:1040:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char guid[16];		/* System GUID */
data/openipmi-2.0.29/lib/pef.c:1372:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pefc->guid, data+1, 16);
data/openipmi-2.0.29/lib/pef.c:1381:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+1, pefc->guid, 16);
data/openipmi-2.0.29/lib/pef.c:1390:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ddata[1];
data/openipmi-2.0.29/lib/pef.c:1509:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s2, s1, len);
data/openipmi-2.0.29/lib/pef.c:1510:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(s2+len, data, data_len);
data/openipmi-2.0.29/lib/pef.c:1538:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data+2, t, 16);
data/openipmi-2.0.29/lib/pef.c:1541:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data+2, t, len+1); /* Make sure to include the nil */
data/openipmi-2.0.29/lib/pef.c:1740:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[1];
data/openipmi-2.0.29/lib/pef.c:1796:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[1];
data/openipmi-2.0.29/lib/pef.c:1822:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     data[1];
data/openipmi-2.0.29/lib/pef.c:1869:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     data[1];
data/openipmi-2.0.29/lib/pef.c:1896:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     data[MAX_IPMI_DATA_SIZE] = { 0, 0 };
data/openipmi-2.0.29/lib/pef.c:1982:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    && !(((unsigned char *) pefc)[lp->optional_offset])))
data/openipmi-2.0.29/lib/pef.c:2039:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/pef.c:2072:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pefc->efts, opefc->efts,
data/openipmi-2.0.29/lib/pef.c:2083:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pefc->apts, opefc->apts,
data/openipmi-2.0.29/lib/pef.c:2094:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pefc->asks, opefc->asks,
data/openipmi-2.0.29/lib/pef.c:2168:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[1];
data/openipmi-2.0.29/lib/pef.c:2276:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, pefc->guid, 16);
data/openipmi-2.0.29/lib/pef.c:2288:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pefc->guid, data, 16);
data/openipmi-2.0.29/lib/pef.c:2300:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, pefc->guid, 16);
data/openipmi-2.0.29/lib/pef.c:2313:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pefc->guid, data, 16);
data/openipmi-2.0.29/lib/pet.c:77:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[22]; /* The actual data. */
data/openipmi-2.0.29/lib/pet.c:78:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mask[22]; /* The mask bits used to mask what we compare. */
data/openipmi-2.0.29/lib/pet.c:103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IPMI_PET_NAME_LEN];
data/openipmi-2.0.29/lib/pet.c:109:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             mac_addr[6];
data/openipmi-2.0.29/lib/pet.c:355:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[1];
data/openipmi-2.0.29/lib/pet.c:397:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[1];
data/openipmi-2.0.29/lib/pet.c:495:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char val[22];
data/openipmi-2.0.29/lib/pet.c:594:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[1];
data/openipmi-2.0.29/lib/pet.c:640:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[1];
data/openipmi-2.0.29/lib/pet.c:734:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char val[22];
data/openipmi-2.0.29/lib/pet.c:848:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[1];
data/openipmi-2.0.29/lib/pet.c:950:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		   unsigned char    mac_addr[6],
data/openipmi-2.0.29/lib/pet.c:962:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               domain_name[IPMI_MC_NAME_LEN];
data/openipmi-2.0.29/lib/pet.c:1059:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pet->lanparm_check[1].data+3, &ip_addr, 4);
data/openipmi-2.0.29/lib/pet.c:1060:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pet->lanparm_check[1].data+7, mac_addr, 6);
data/openipmi-2.0.29/lib/pet.c:1125:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char    mac_addr[6],
data/openipmi-2.0.29/lib/pet.c:1269:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name, pet->name, slen);
data/openipmi-2.0.29/lib/pet.c:1335:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ip_addr, &pet->ip_addr, sizeof(*ip_addr));
data/openipmi-2.0.29/lib/pet.c:1339:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char *
data/openipmi-2.0.29/lib/pet.c:1340:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ipmi_pet_get_mac_addr(ipmi_pet_t *pet, unsigned char mac_addr[6])
data/openipmi-2.0.29/lib/pet.c:1342:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mac_addr, pet->mac_addr, 6);
data/openipmi-2.0.29/lib/rakp.c:181:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       data[64];
data/openipmi-2.0.29/lib/rakp.c:240:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, msg->data+8, 16);
data/openipmi-2.0.29/lib/rakp.c:246:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, msg->data+24, 16);
data/openipmi-2.0.29/lib/rakp.c:304:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       data[44];
data/openipmi-2.0.29/lib/rakp.c:317:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+8, p, 16);
data/openipmi-2.0.29/lib/rakp.c:324:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+28, p, data[27]);
data/openipmi-2.0.29/lib/rakp.c:453:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       idata[74];
data/openipmi-2.0.29/lib/rakp.c:455:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       integ_data[20];
data/openipmi-2.0.29/lib/rakp.c:468:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+8, p, 16);
data/openipmi-2.0.29/lib/rakp.c:470:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+24, p, 16);
data/openipmi-2.0.29/lib/rakp.c:472:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+40, p, 16);
data/openipmi-2.0.29/lib/rakp.c:478:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+58, p, idata[57]);
data/openipmi-2.0.29/lib/rakp.c:489:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+0, p, 16);
data/openipmi-2.0.29/lib/rakp.c:491:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+16, p, 16);
data/openipmi-2.0.29/lib/rakp.c:495:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+34, p, idata[33]);
data/openipmi-2.0.29/lib/rakp.c:528:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       idata[38];
data/openipmi-2.0.29/lib/rakp.c:538:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+0, p, 16);
data/openipmi-2.0.29/lib/rakp.c:549:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+22, p, idata[21]);
data/openipmi-2.0.29/lib/rakp.c:566:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       idata[36];
data/openipmi-2.0.29/lib/rakp.c:568:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       integ_data[20];
data/openipmi-2.0.29/lib/rakp.c:577:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+0, p, 16);
data/openipmi-2.0.29/lib/rakp.c:582:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(idata+20, p, 16);
data/openipmi-2.0.29/lib/rakp.c:690:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out_data, msg->data, msg->data_len);
data/openipmi-2.0.29/lib/rakp.c:722:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rspi->data, data, data_len);
data/openipmi-2.0.29/lib/sdr.c:80:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MAX_SDR_FETCH_BYTES+2];
data/openipmi-2.0.29/lib/sdr.c:89:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IPMI_MC_NAME_LEN+1+20];
data/openipmi-2.0.29/lib/sdr.c:126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lun_has_sensors[4];
data/openipmi-2.0.29/lib/sdr.c:197:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char db_key[32+5];
data/openipmi-2.0.29/lib/sdr.c:209:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			      memcpy(info->last, info->last+1,		\
data/openipmi-2.0.29/lib/sdr.c:290:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sdrs->sdrs, db_data, sizeof(ipmi_sdr_t) * num);
data/openipmi-2.0.29/lib/sdr.c:761:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sdr.c:816:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&sdr->data[info->offset-SDR_HEADER_SIZE],
data/openipmi-2.0.29/lib/sdr.c:897:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sdr.c:1221:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(info->data, rsp->data+1, rsp->data_len-1);
data/openipmi-2.0.29/lib/sdr.c:1307:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(new_sdrs, sdrs->working_sdrs,
data/openipmi-2.0.29/lib/sdr.c:1705:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sdr.c:1868:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       guid[16];
data/openipmi-2.0.29/lib/sdr.c:1907:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    s += sprintf(s, "sdr-");
data/openipmi-2.0.29/lib/sdr.c:1909:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		s += sprintf(s, "%2.2x", guid[i]);
data/openipmi-2.0.29/lib/sdr.c:2280:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_array, sdrs->sdrs, sizeof(ipmi_sdr_t)*sdrs->sdr_array_size);
data/openipmi-2.0.29/lib/sdr.c:2289:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&((sdrs->sdrs)[pos]), sdr, sizeof(*sdr));
data/openipmi-2.0.29/lib/sdr.c:2348:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sdr.c:2365:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cmd_msg.data+11, sdr->data, sdr->length);
data/openipmi-2.0.29/lib/sdr.c:2371:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cmd_msg.data+11, sdr->data, (sdrs->fetch_size - 5));
data/openipmi-2.0.29/lib/sdr.c:2387:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sdr.c:2454:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cmd_msg.data+6, sdr->data+sdrs->sdr_data_write, wleft);
data/openipmi-2.0.29/lib/sdr.c:2460:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cmd_msg.data+6, sdr->data+sdrs->sdr_data_write,
data/openipmi-2.0.29/lib/sdr.c:2632:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sdr.c:2715:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sdr.c:2785:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sel.c:166:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char          start_rec_id_data[14];
data/openipmi-2.0.29/lib/sel.c:189:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[SEL_NAME_LEN];
data/openipmi-2.0.29/lib/sel.c:595:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sel.c:621:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sel.c:825:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sel->start_rec_id_data, rsp->data+5, 14);
data/openipmi-2.0.29/lib/sel.c:881:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sel.c:1094:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sel.c:1399:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sel.c:1508:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sel.c:1647:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sel.c:1735:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sel.c:2522:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char             data[16];
data/openipmi-2.0.29/lib/sel.c:2532:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data+3, ipmi_event_get_data_ptr(event), 13);
data/openipmi-2.0.29/lib/sensor.c:179:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char default_thresholds[6];
data/openipmi-2.0.29/lib/sensor.c:189:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char id[SENSOR_ID_LEN]; /* The ID from the device SDR. */
data/openipmi-2.0.29/lib/sensor.c:216:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IPMI_SENSOR_NAME_LEN+1];
data/openipmi-2.0.29/lib/sensor.c:431:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               id[33];
data/openipmi-2.0.29/lib/sensor.c:889:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(new_array, sensors->sensors_by_idx[4],
data/openipmi-2.0.29/lib/sensor.c:1150:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name, sensor->name, slen);
data/openipmi-2.0.29/lib/sensor.c:1452:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(s[p+j], s[p], sizeof(ipmi_sensor_t));
data/openipmi-2.0.29/lib/sensor.c:1752:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(new_by_idx,
data/openipmi-2.0.29/lib/sensor.c:2916:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(id, sensor->id, clen);
data/openipmi-2.0.29/lib/sensor.c:3242:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sensor->id, id, length);
data/openipmi-2.0.29/lib/sensor.c:3848:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sensor.c:3892:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sensor.c:4142:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char           cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sensor.c:4228:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sensor.c:4335:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sensor.c:4428:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sensor.c:4570:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sensor.c:4673:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sensor.c:4814:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/sensor.c:4918:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     cmd_data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/solparm.c:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IPMI_SOLPARM_NAME_LEN];
data/openipmi-2.0.29/lib/solparm.c:235:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name, solparm->name, slen);
data/openipmi-2.0.29/lib/solparm.c:523:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char           data[4];
data/openipmi-2.0.29/lib/solparm.c:635:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char        data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/solparm.c:783:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(elem->data+2, data, data_len);
data/openipmi-2.0.29/lib/solparm.c:1085:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[1];
data/openipmi-2.0.29/lib/solparm.c:1145:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[1];
data/openipmi-2.0.29/lib/solparm.c:1173:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     data[1];
data/openipmi-2.0.29/lib/solparm.c:1222:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     data[1];
data/openipmi-2.0.29/lib/solparm.c:1249:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/solparm.c:1276:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    && !(((unsigned char *) solc)[lp->optional_offset])))
data/openipmi-2.0.29/lib/solparm.c:1320:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     data[MAX_IPMI_DATA_SIZE];
data/openipmi-2.0.29/lib/solparm.c:1387:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[1];
data/openipmi-2.0.29/lib/strings.c:451:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *event_reading_states[256][16] =
data/openipmi-2.0.29/lib/strings.c:505:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *sensor_states[256][16] =
data/openipmi-2.0.29/lib/strings.c:1224:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dummy[1];
data/openipmi-2.0.29/lib/strings.c:1316:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, err_type, len);
data/openipmi-2.0.29/sample/dump_sensors.c:79:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[33];
data/openipmi-2.0.29/sample/eventd.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errstr[128];						\
data/openipmi-2.0.29/sample/eventd.c:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errstr[128];						\
data/openipmi-2.0.29/sample/eventd.c:102:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(s + o, indent, ilen);
data/openipmi-2.0.29/sample/eventd.c:190:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char typestr[30];
data/openipmi-2.0.29/sample/eventd.c:191:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char timestr[30];
data/openipmi-2.0.29/sample/eventd.c:192:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char datastr[128];
data/openipmi-2.0.29/sample/eventd.c:193:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *parms2[6];
data/openipmi-2.0.29/sample/eventd.c:202:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char eventdata[16];
data/openipmi-2.0.29/sample/eventd.c:290:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(execvals, prog, num_prog * sizeof(char *));
data/openipmi-2.0.29/sample/eventd.c:292:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(execvals + num_prog + 1, parms, num_parms * sizeof(char *));
data/openipmi-2.0.29/sample/eventd.c:293:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(execvals + num_prog + num_parms + 1, parms2,
data/openipmi-2.0.29/sample/eventd.c:324:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char idstr[128];
data/openipmi-2.0.29/sample/eventd.c:347:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *thresh_to_severity[6] = {
data/openipmi-2.0.29/sample/eventd.c:367:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *parms[10 + MAX_EXTRA_PARMS];
data/openipmi-2.0.29/sample/eventd.c:369:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char valstr[30];
data/openipmi-2.0.29/sample/eventd.c:370:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rawstr[30];
data/openipmi-2.0.29/sample/eventd.c:410:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *parms[6 + MAX_EXTRA_PARMS];
data/openipmi-2.0.29/sample/eventd.c:412:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sevstr[30];
data/openipmi-2.0.29/sample/eventd.c:413:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prevstr[30];
data/openipmi-2.0.29/sample/eventd.c:414:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char offstr[30];
data/openipmi-2.0.29/sample/eventd.c:461:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[33];
data/openipmi-2.0.29/sample/eventd.c:585:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(newformat, ": ");
data/openipmi-2.0.29/sample/eventd.c:712:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	outfile = fopen(outfname, "a");
data/openipmi-2.0.29/sample/example_oem.c:127:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char                  vals[4];
data/openipmi-2.0.29/sample/example_oem.c:932:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[4];
data/openipmi-2.0.29/sample/example_oem.c:1087:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[4];
data/openipmi-2.0.29/sample/example_oem.c:1281:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[5];
data/openipmi-2.0.29/sample/example_oem.c:1384:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      data[4];
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:55:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[IPMB_MAX_MSG_LENGTH];
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:103:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char attn_chars[8];
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:125:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char hex2char[16] = {
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:193:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(msg+6, omsg, omsg_len);
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:236:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char recv_chars[RA_MAX_CHARS_SIZE];
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:246:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[RA_MAX_CHARS_SIZE];
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:274:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char o[IPMI_MAX_MSG_LENGTH];
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:352:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char msg[IPMI_MAX_MSG_LENGTH + 7];
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:386:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char recv_msg[IPMI_MAX_MSG_LENGTH + 4];
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:489:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[(IPMI_MAX_MSG_LENGTH + 7) * 2];
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:490:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char msg[IPMI_MAX_MSG_LENGTH + 7];
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:555:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char recv_chars[TM_MAX_CHARS_SIZE];
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:565:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[TM_MAX_CHARS_SIZE];
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:621:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char o[IPMI_MAX_MSG_LENGTH];
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:810:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rsp[IPMI_MAX_MSG_LENGTH];
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:832:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(rsp+1, ipmb_devid_data, sizeof(ipmb_devid_data));
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:868:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rsp[IPMI_MAX_MSG_LENGTH];
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:895:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(rsp+1, devid_data, sizeof(devid_data));
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:901:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(rsp+1, guid_data, sizeof(guid_data));
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:930:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(rsp + 2, m->data + 1, m->data_len - 1);
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:997:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(rsp + 1, m->data, m->data_len);
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:1037:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(rsp+1, pp_oem_chars, 3);
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:1051:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(rsp+1, pp_oem_chars, 3);
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:1422:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addr, res0->ai_addr, res0->ai_addrlen);
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:1464:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[128];
data/openipmi-2.0.29/sample/ipmicmd.c:270:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  data[IPMI_MAX_MSG_LENGTH];
data/openipmi-2.0.29/sample/ipmicmd.c:338:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data->data, msg->data, msg->data_len);
data/openipmi-2.0.29/sample/ipmicmd.c:340:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&data->addr, addr, addr_len);
data/openipmi-2.0.29/sample/ipmicmd.c:367:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               addr_data[sizeof(ipmi_addr_t)];
data/openipmi-2.0.29/sample/ipmicmd.c:371:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      outbuf[IPMI_MAX_MSG_LENGTH];
data/openipmi-2.0.29/sample/ipmicmd.c:581:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char input_line[256];
data/openipmi-2.0.29/sample/linux_cmd_handler.c:182:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(devname, O_RDWR);
data/openipmi-2.0.29/sample/linux_cmd_handler.c:202:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[IPMI_MAX_MSG_LENGTH];
data/openipmi-2.0.29/sample/linux_cmd_handler.c:203:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char rspdata[IPMI_MAX_MSG_LENGTH];
data/openipmi-2.0.29/sample/linux_cmd_handler.c:272:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rspdata + 1, recv.msg.data, recv.msg.data_len);
data/openipmi-2.0.29/sample/rmcp_ping.c:43:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char ping_msg[12] =
data/openipmi-2.0.29/sample/rmcp_ping.c:127:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char      rsp[28];
data/openipmi-2.0.29/sample/rmcp_ping.c:130:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               dest_data[sizeof(struct sockaddr)];
data/openipmi-2.0.29/sample/rmcp_ping.c:133:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               src_data[sizeof(struct sockaddr)];
data/openipmi-2.0.29/sample/rmcp_ping.c:141:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               host[200];
data/openipmi-2.0.29/sample/rmcp_ping.c:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               serv[200];
data/openipmi-2.0.29/sample/rmcp_ping.c:199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ports[16];
data/openipmi-2.0.29/sample/sample.c:85:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[33];
data/openipmi-2.0.29/sample/sample.c:120:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[33];
data/openipmi-2.0.29/sample/sample.c:152:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[33];
data/openipmi-2.0.29/sample/sample2.c:200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[33];
data/openipmi-2.0.29/sample/sample3.c:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               name[MAX_SENSOR_NAME_SIZE];
data/openipmi-2.0.29/sample/sample3.c:587:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char name[120];
data/openipmi-2.0.29/sample/sample3.c:613:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[50];
data/openipmi-2.0.29/sample/solterm.c:222:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char c = ((unsigned char *)data)[i];
data/openipmi-2.0.29/sample/solterm.c:239:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		printf("%02x", ((unsigned char *)data)[i]);
data/openipmi-2.0.29/sample/solterm.c:254:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		printf("%c", ((unsigned char *)data)[i]);
data/openipmi-2.0.29/sample/solterm.c:275:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *state_names[5] = {"Closed", "Connecting", "Connected", "Connected (Char Trans Unavail)", "Closing"};
data/openipmi-2.0.29/sample/solterm.c:281:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char error_string[ERROR_STRING_LEN];
data/openipmi-2.0.29/sample/solterm.c:334:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[50];
data/openipmi-2.0.29/sample/solterm.c:356:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[50];
data/openipmi-2.0.29/sample/solterm.c:367:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[50];
data/openipmi-2.0.29/sample/solterm.c:378:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[50];
data/openipmi-2.0.29/sample/solterm.c:464:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[50];
data/openipmi-2.0.29/sample/solterm.c:505:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[80];
data/openipmi-2.0.29/sample/waiter_sample.c:156:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/sample/waiter_sample.c:245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/sample/waiter_sample.c:285:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	ebuf[128];
data/openipmi-2.0.29/tcl/tcl_os_hnd.c:218:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open("/dev/urandom", O_RDONLY);
data/openipmi-2.0.29/tcl/tcl_os_hnd.c:760:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rv, &ipmi_tcl_os_handler, sizeof(*rv));
data/openipmi-2.0.29/ui/ui.c:724:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char out[2];
data/openipmi-2.0.29/ui/ui.c:732:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(new_line, line_buffer, line_buffer_pos);
data/openipmi-2.0.29/ui/ui.c:913:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:914:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[33];
data/openipmi-2.0.29/ui/ui.c:1083:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[33];
data/openipmi-2.0.29/ui/ui.c:1084:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:1100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[33];
data/openipmi-2.0.29/ui/ui.c:1101:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ename[IPMI_ENTITY_NAME_LEN];
data/openipmi-2.0.29/ui/ui.c:1102:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:1233:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:1306:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:1531:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[33];
data/openipmi-2.0.29/ui/ui.c:1532:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name2[33];
data/openipmi-2.0.29/ui/ui.c:1533:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:1549:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:1600:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:1601:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[33];
data/openipmi-2.0.29/ui/ui.c:1602:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sname[IPMI_SENSOR_NAME_LEN];
data/openipmi-2.0.29/ui/ui.c:2266:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[33];
data/openipmi-2.0.29/ui/ui.c:2374:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:2493:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:2494:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[33];
data/openipmi-2.0.29/ui/ui.c:2495:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name2[33];
data/openipmi-2.0.29/ui/ui.c:2511:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:2539:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:2541:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[33];
data/openipmi-2.0.29/ui/ui.c:2542:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cname[IPMI_CONTROL_NAME_LEN];
data/openipmi-2.0.29/ui/ui.c:2772:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(normal_control_vals, val, sizeof(int) * num_vals);
data/openipmi-2.0.29/ui/ui.c:2824:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(id_control_vals, val, sizeof(unsigned char) * length);
data/openipmi-2.0.29/ui/ui.c:2896:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                name[33];
data/openipmi-2.0.29/ui/ui.c:2982:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:3186:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openipmi-2.0.29/ui/ui.c:3235:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openipmi-2.0.29/ui/ui.c:3505:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:3623:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char vals[4];
data/openipmi-2.0.29/ui/ui.c:3795:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MCCMD_DATA_SIZE];
data/openipmi-2.0.29/ui/ui.c:4015:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[128];
data/openipmi-2.0.29/ui/ui.c:4266:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[2];
data/openipmi-2.0.29/ui/ui.c:4290:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          buf[100];
data/openipmi-2.0.29/ui/ui.c:4487:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[30];
data/openipmi-2.0.29/ui/ui.c:4591:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[128];
data/openipmi-2.0.29/ui/ui.c:4872:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  data[3];
data/openipmi-2.0.29/ui/ui.c:4897:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           buf[100];
data/openipmi-2.0.29/ui/ui.c:5059:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[30];
data/openipmi-2.0.29/ui/ui.c:5130:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  mac_addr[6];
data/openipmi-2.0.29/ui/ui.c:5204:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char    data[MCCMD_DATA_SIZE];
data/openipmi-2.0.29/ui/ui.c:5528:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[13];
data/openipmi-2.0.29/ui/ui.c:6123:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         *parms[30];
data/openipmi-2.0.29/ui/ui.c:6212:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/ui/ui.c:6245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/ui/ui.c:6277:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IPMI_DOMAIN_NAME_LEN];
data/openipmi-2.0.29/ui/ui.c:6641:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:6642:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          name[33];
data/openipmi-2.0.29/ui/ui.c:6671:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:6672:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          name[33];
data/openipmi-2.0.29/ui/ui.c:6696:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:6697:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          name[33];
data/openipmi-2.0.29/ui/ui.c:6698:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          name2[33];
data/openipmi-2.0.29/ui/ui.c:6743:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:6744:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          name[33];
data/openipmi-2.0.29/ui/ui.c:6745:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          name2[33];
data/openipmi-2.0.29/ui/ui.c:6775:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:6789:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:6814:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:6830:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc[MAX_ENTITY_LOC_SIZE];
data/openipmi-2.0.29/ui/ui.c:6961:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                str[200];
data/openipmi-2.0.29/ui/ui_os.c:229:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open("/dev/urandom", O_RDONLY);
data/openipmi-2.0.29/unix/posix_os_hnd.c:305:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open("/dev/urandom", O_RDONLY);
data/openipmi-2.0.29/unix/posix_os_hnd.c:627:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rv, &ipmi_posix_os_handler, sizeof(*rv));
data/openipmi-2.0.29/unix/posix_thread_os_hnd.c:306:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open("/dev/urandom", O_RDONLY);
data/openipmi-2.0.29/unix/posix_thread_os_hnd.c:911:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rv, &ipmi_posix_thread_os_handler, sizeof(*rv));
data/openipmi-2.0.29/unix/test_heap.c:105:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	random_seed = atoi(argv[i]);
data/openipmi-2.0.29/utils/ipmi_auth.c:69:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[16];
data/openipmi-2.0.29/utils/ipmi_auth.c:89:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data->data, password, 16);
data/openipmi-2.0.29/utils/ipmi_auth.c:97:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(output, handle->data, 16);
data/openipmi-2.0.29/utils/ipmi_malloc.c:463:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rv, str, length);
data/openipmi-2.0.29/utils/md2.c:153:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->inbuf+ctx->count, inbuf, cnt);
data/openipmi-2.0.29/utils/md2.c:167:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->inbuf, inbuf, cnt);
data/openipmi-2.0.29/utils/md2.c:193:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->inbuf, ctx->checksum, 16);
data/openipmi-2.0.29/utils/md2.c:209:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[16];
data/openipmi-2.0.29/utils/md2.c:230:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data->data, password, 16);
data/openipmi-2.0.29/utils/md2.c:250:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(output, md2_read(&ctx), 16);
data/openipmi-2.0.29/utils/md5.c:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openipmi-2.0.29/utils/md5.c:326:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20];
data/openipmi-2.0.29/utils/md5.c:352:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data->data, password, password_len);
data/openipmi-2.0.29/utils/md5.c:383:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(output, md5_read(&ctx), 16);
data/openipmi-2.0.29/utils/string.c:68:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, *d, len);
data/openipmi-2.0.29/utils/string.c:78:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char table[16] = {
data/openipmi-2.0.29/utils/string.c:122:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char table[64] = {
data/openipmi-2.0.29/utils/string.c:277:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char table_4_bit[256] =
data/openipmi-2.0.29/utils/string.c:314:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char table_6_bit[256] =
data/openipmi-2.0.29/utils/string.c:452:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[2];
data/openipmi-2.0.29/utils/string.c:467:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(output+1, input, in_len);
data/openipmi-2.0.29/utils/string.c:523:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(output+1, input, in_len);
data/openipmi-2.0.29/cmdlang/cmd_domain.c:944:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char            *s = ipmi_mem_alloc(strlen(name) + strlen(inst) + 2);
data/openipmi-2.0.29/cmdlang/cmd_domain.c:944:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char            *s = ipmi_mem_alloc(strlen(name) + strlen(inst) + 2);
data/openipmi-2.0.29/cmdlang/cmd_fru.c:369:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(str);
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:499:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmdlang->err = f(lanc, val, strlen(val));
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:948:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(info->name, name, sizeof(info->name) - 1);
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:1032:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(info->name, name, sizeof(info->name) - 1);
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:1084:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(cmdlang->objstr, lanc_name, cmdlang->objstr_len);
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:1148:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(cmdlang->objstr, argv[curr_arg], cmdlang->objstr_len);
data/openipmi-2.0.29/cmdlang/cmd_lanparm.c:1268:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(cmdlang->objstr, lanc_name, cmdlang->objstr_len);
data/openipmi-2.0.29/cmdlang/cmd_mc.c:1834:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	rv |= ipmi_user_set_name(user, info->name, strlen(info->name));
data/openipmi-2.0.29/cmdlang/cmd_mc.c:2000:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(info->name, argv[curr_arg], 15);
data/openipmi-2.0.29/cmdlang/cmd_mc.c:2010:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(info->pw, argv[curr_arg], 16);
data/openipmi-2.0.29/cmdlang/cmd_mc.c:2019:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(info->pw, argv[curr_arg], 19);
data/openipmi-2.0.29/cmdlang/cmd_pef.c:345:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(val) != 32) {
data/openipmi-2.0.29/cmdlang/cmd_pef.c:797:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(info->name, name, sizeof(info->name) - 1);
data/openipmi-2.0.29/cmdlang/cmd_pef.c:881:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(info->name, name, sizeof(info->name) - 1);
data/openipmi-2.0.29/cmdlang/cmd_pef.c:933:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(cmdlang->objstr, lanc_name, cmdlang->objstr_len);
data/openipmi-2.0.29/cmdlang/cmd_pef.c:997:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(cmdlang->objstr, argv[curr_arg], cmdlang->objstr_len);
data/openipmi-2.0.29/cmdlang/cmd_pef.c:1147:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(cmdlang->objstr, lanc_name, cmdlang->objstr_len);
data/openipmi-2.0.29/cmdlang/cmd_sensor.c:249:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(cstr)) {
data/openipmi-2.0.29/cmdlang/cmd_solparm.c:542:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(info->name, name, sizeof(info->name) - 1);
data/openipmi-2.0.29/cmdlang/cmd_solparm.c:626:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(info->name, name, sizeof(info->name) - 1);
data/openipmi-2.0.29/cmdlang/cmd_solparm.c:678:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(cmdlang->objstr, solc_name, cmdlang->objstr_len);
data/openipmi-2.0.29/cmdlang/cmd_solparm.c:742:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(cmdlang->objstr, argv[curr_arg], cmdlang->objstr_len);
data/openipmi-2.0.29/cmdlang/cmd_solparm.c:804:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(cmdlang->objstr, solc_name, cmdlang->objstr_len);
data/openipmi-2.0.29/cmdlang/cmdlang.c:152:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(str) == 0)
data/openipmi-2.0.29/cmdlang/cmdlang.c:1949:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    tv = str + strlen(str);
data/openipmi-2.0.29/cmdlang/cmdlang.c:2046:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(val[0]) != 4)
data/openipmi-2.0.29/cmdlang/cmdlang.c:2301:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	entry->len = strlen(value);
data/openipmi-2.0.29/cmdlang/cmdlang.c:2467:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(info->cmdlang->objstr) == 0) {
data/openipmi-2.0.29/cmdlang/ipmish.c:522:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int indent2 = (out_data->indent * 2) + strlen(name) + 1;
data/openipmi-2.0.29/cmdlang/ipmish.c:599:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(info->objstr) == 0) {
data/openipmi-2.0.29/cmdlang/ipmish.c:673:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    indent2 = (level * 2) + strlen(name) + 1;
data/openipmi-2.0.29/cmdlang/ipmish.c:710:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if (expansion && strlen(expansion)){
data/openipmi-2.0.29/cmdlang/os_debug.c:251:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rv = read(fd, data, len);
data/openipmi-2.0.29/cmdlang/os_debug.c:414:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	gdbm_filename = malloc(strlen(home)+strlen(GDBM_FILE)+2);
data/openipmi-2.0.29/cmdlang/os_debug.c:414:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	gdbm_filename = malloc(strlen(home)+strlen(GDBM_FILE)+2);
data/openipmi-2.0.29/cmdlang/os_debug.c:418:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(gdbm_filename, "/");
data/openipmi-2.0.29/cmdlang/os_debug.c:442:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gkey.dsize = strlen(key);
data/openipmi-2.0.29/cmdlang/os_debug.c:473:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gkey.dsize = strlen(key);
data/openipmi-2.0.29/glib/glib_os_hnd.c:260:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rv = read(fd, data, len);
data/openipmi-2.0.29/glib/glib_os_hnd.c:664:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	info->gdbm_filename = malloc(strlen(home)+strlen(GDBM_FILE)+2);
data/openipmi-2.0.29/glib/glib_os_hnd.c:664:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	info->gdbm_filename = malloc(strlen(home)+strlen(GDBM_FILE)+2);
data/openipmi-2.0.29/glib/glib_os_hnd.c:668:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(info->gdbm_filename, "/");
data/openipmi-2.0.29/glib/glib_os_hnd.c:697:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gkey.dsize = strlen(key);
data/openipmi-2.0.29/glib/glib_os_hnd.c:733:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gkey.dsize = strlen(key);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:317:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					  unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:324:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					    unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:334:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:348:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					       unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:355:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					       unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:362:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:369:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					      unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:376:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:386:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				   unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:398:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:405:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					   unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:412:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:419:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					      unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:426:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						    unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:433:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:440:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					  unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmi_fru.h:450:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     unsigned int *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2597:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					     unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2605:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					       unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2615:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2630:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						  unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2638:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						  unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2646:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						   unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2654:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						 unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2661:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					   unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2671:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				      unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2684:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						   unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2692:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					      unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2702:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2710:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						 unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2719:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						       unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2726:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					   unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2733:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					     unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/ipmiif.h:2743:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					unsigned int  *strlen);
data/openipmi-2.0.29/include/OpenIPMI/os_handler.h:346:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			  int read, int write, int except);
data/openipmi-2.0.29/lanserv/OpenIPMI/serv.h:395:47:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    void (*io_set_enables)(ipmi_io_t *io, int read, int write, int except);
data/openipmi-2.0.29/lanserv/bmc_sensor.c:1261:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rv = read(fd, data, length);
data/openipmi-2.0.29/lanserv/bmc_sensor.c:1277:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rv = read(fd, data, sizeof(data) - 1);
data/openipmi-2.0.29/lanserv/bmc_storage.c:2014:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	l = read(fd, data, length);
data/openipmi-2.0.29/lanserv/config.c:335:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    char *newrv = malloc(strlen(rv) + strlen(val) + 1);
data/openipmi-2.0.29/lanserv/config.c:335:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    char *newrv = malloc(strlen(rv) + strlen(val) + 1);
data/openipmi-2.0.29/lanserv/config.c:522:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	end = strlen(tok) - 1;
data/openipmi-2.0.29/lanserv/config.c:536:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(tok) != 32) {
data/openipmi-2.0.29/lanserv/emu_cmd.c:156:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(str) != size) {
data/openipmi-2.0.29/lanserv/emu_cmd.c:216:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	end = strlen(tok) - 1;
data/openipmi-2.0.29/lanserv/emu_cmd.c:230:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(tok) != 32) {
data/openipmi-2.0.29/lanserv/emu_cmd.c:274:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    pos = strlen(buffer);
data/openipmi-2.0.29/lanserv/emu_cmd.c:1098:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *nf = malloc(strlen(BASE_CONF_STR) + strlen(filename) + 2);
data/openipmi-2.0.29/lanserv/emu_cmd.c:1098:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *nf = malloc(strlen(BASE_CONF_STR) + strlen(filename) + 2);
data/openipmi-2.0.29/lanserv/emu_cmd.c:1104:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(nf, "/");
data/openipmi-2.0.29/lanserv/extcmd.c:230:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    unsigned int len = strlen(t->name);
data/openipmi-2.0.29/lanserv/extcmd.c:254:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size = strlen(name) + 1;
data/openipmi-2.0.29/lanserv/extcmd.c:256:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size += strlen(value) + 3;
data/openipmi-2.0.29/lanserv/extcmd.c:257:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size += strlen(*cmd);
data/openipmi-2.0.29/lanserv/extcmd.c:267:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(newcmd, " ");
data/openipmi-2.0.29/lanserv/extcmd.c:272:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(newcmd, "\"");
data/openipmi-2.0.29/lanserv/extcmd.c:297:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cmd = malloc(strlen(incmd) + 5);
data/openipmi-2.0.29/lanserv/extcmd.c:370:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cmd = malloc(strlen(incmd) + 5);
data/openipmi-2.0.29/lanserv/extcmd.c:439:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cmd = malloc(strlen(incmd) + 7);
data/openipmi-2.0.29/lanserv/ipmb_ipmi.c:183:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(tok) > IPMIDEV_MAX_SIZE) {
data/openipmi-2.0.29/lanserv/ipmi_sim.c:217:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rv = read(fd, data, len);
data/openipmi-2.0.29/lanserv/ipmi_sim.c:420:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    len = read(fd, msgd, sizeof(msgd));
data/openipmi-2.0.29/lanserv/ipmi_sim.c:595:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    len = read(fd, msgd, sizeof(msgd));
data/openipmi-2.0.29/lanserv/ipmi_sim.c:978:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    (void) write(info->outfd, msg, strlen(msg));
data/openipmi-2.0.29/lanserv/ipmi_sim.c:998:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    count = read(fd, rc, sizeof(rc));
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1051:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	err = write(rv, msg, strlen(msg));
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1074:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	err = write(rv, msg, strlen(msg));
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1190:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ipmi_io_set_enables(ipmi_io_t *io, int read, int write, int except)
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1193:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				     io->id, read, write, except);
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1365:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    rv = read(sigpipeh[0], &buf, 1);
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1410:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cmd = malloc(strlen(startcmd->startcmd) + 6);
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1637:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	command_file = malloc(strlen(BASE_CONF_STR) + 6 + strlen(sysinfo.name));
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1637:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	command_file = malloc(strlen(BASE_CONF_STR) + 6 + strlen(sysinfo.name));
data/openipmi-2.0.29/lanserv/ipmi_sim.c:1643:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(command_file, "/");
data/openipmi-2.0.29/lanserv/lanserv.c:243:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rv = read(fd, data, len);
data/openipmi-2.0.29/lanserv/lanserv.c:705:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cmd = malloc(strlen(startcmd->startcmd) + 6);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:448:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    rv = read(fd, data, size);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:1659:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rv = read(fd, &c, 1);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2533:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    read(fd, &dummy, 1);
data/openipmi-2.0.29/lanserv/marvell-bmc/marvell_mod.c:2641:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    rv = read(fd, board_fru_data, sizeof(board_fru_data));
data/openipmi-2.0.29/lanserv/persist.c:108:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(papp) + strlen(instance) + 2;
data/openipmi-2.0.29/lanserv/persist.c:108:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(papp) + strlen(instance) + 2;
data/openipmi-2.0.29/lanserv/persist.c:113:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(app, "/");
data/openipmi-2.0.29/lanserv/persist.c:116:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(basedir) + strlen(app) + 3;
data/openipmi-2.0.29/lanserv/persist.c:116:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(basedir) + strlen(app) + 3;
data/openipmi-2.0.29/lanserv/persist.c:123:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(dname, "/");
data/openipmi-2.0.29/lanserv/persist.c:125:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(dname, "/");
data/openipmi-2.0.29/lanserv/persist.c:198:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (strlen(basedir) + strlen(app) + strlen(p->name)
data/openipmi-2.0.29/lanserv/persist.c:198:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (strlen(basedir) + strlen(app) + strlen(p->name)
data/openipmi-2.0.29/lanserv/persist.c:198:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (strlen(basedir) + strlen(app) + strlen(p->name)
data/openipmi-2.0.29/lanserv/persist.c:199:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	       + strlen(sfx) + 3);
data/openipmi-2.0.29/lanserv/persist.c:205:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(fname, "/");
data/openipmi-2.0.29/lanserv/persist.c:207:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(fname, "/");
data/openipmi-2.0.29/lanserv/persist.c:313:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(name) == 0 || !*type || *(type + 1) != ':')
data/openipmi-2.0.29/lanserv/persist.c:607:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    rv = alloc_pi(p, PITEM_STR, val, strlen(val), name, ap);
data/openipmi-2.0.29/lanserv/sdrcomp/sdrcomp.c:992:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    char *newrv = malloc(strlen(rv) + strlen(val) + 1);
data/openipmi-2.0.29/lanserv/sdrcomp/sdrcomp.c:992:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    char *newrv = malloc(strlen(rv) + strlen(val) + 1);
data/openipmi-2.0.29/lanserv/sdrcomp/sdrcomp.c:1087:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(tok) > 1) {
data/openipmi-2.0.29/lanserv/sdrcomp/sdrcomp.c:1140:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(tok) > 1) {
data/openipmi-2.0.29/lanserv/sdrcomp/sdrcomp.c:1476:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ipmi_set_device_string(sval, IPMI_ASCII_STR, strlen(sval),
data/openipmi-2.0.29/lanserv/sol.c:191:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return 7 + strlen(uucp_lck_dir) + strlen(ptr);
data/openipmi-2.0.29/lanserv/sol.c:191:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return 7 + strlen(uucp_lck_dir) + strlen(ptr);
data/openipmi-2.0.29/lanserv/sol.c:265:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    n = read(fd, &buf, sizeof(buf) - 1);
data/openipmi-2.0.29/lanserv/sol.c:286:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	    mask = umask(022);
data/openipmi-2.0.29/lanserv/sol.c:288:6:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	    umask(mask);
data/openipmi-2.0.29/lanserv/sol.c:292:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		rv = write_full(fd, buf.str, strlen(buf.str));
data/openipmi-2.0.29/lanserv/sol.c:761:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    unsigned int endmsg_size = strlen(end_history_msg);
data/openipmi-2.0.29/lanserv/sol.c:1571:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    rv = read(fd, buf, readsize);
data/openipmi-2.0.29/lanserv/sol.c:1670:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    end = opt + strlen(opt);
data/openipmi-2.0.29/lib/domain.c:971:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(domain->name, name, sizeof(domain->name)-2);
data/openipmi-2.0.29/lib/domain.c:972:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(domain->name);
data/openipmi-2.0.29/lib/domain.c:1004:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len1 = strlen(domain->name);
data/openipmi-2.0.29/lib/domain.c:5751:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slen = strlen(domain->name);
data/openipmi-2.0.29/lib/entity.c:998:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slen = strlen(ent->name);
data/openipmi-2.0.29/lib/entity.c:3650:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	strncpy(info->id, "**INVALID**", sizeof(info->id));
data/openipmi-2.0.29/lib/entity.c:3651:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	info->id_len = strlen(info->id);
data/openipmi-2.0.29/lib/entity.c:3733:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	strncpy(info->id, "**INVALID**", sizeof(info->id));
data/openipmi-2.0.29/lib/entity.c:3734:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	info->id_len = strlen(info->id);
data/openipmi-2.0.29/lib/entity.c:3851:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	strncpy(info->id, "**INVALID**", sizeof(info->id));
data/openipmi-2.0.29/lib/entity.c:3852:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	info->id_len = strlen(info->id);
data/openipmi-2.0.29/lib/entity.c:7961:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 unsigned int  *strlen)			\
data/openipmi-2.0.29/lib/entity.c:7966:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return ipmi_fru_get_ ## name(entity->fru, str, strlen);	\
data/openipmi-2.0.29/lib/fru.c:1626:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slen = strlen(fru->name);
data/openipmi-2.0.29/lib/fru_spd_decode.c:120:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(idata) + 1;
data/openipmi-2.0.29/lib/fru_spd_decode.c:129:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    len = strlen(idata) + 1;
data/openipmi-2.0.29/lib/ipmi_lan.c:6435:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int nlen = strlen(value);
data/openipmi-2.0.29/lib/ipmi_lan.c:6709:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    len = strlen(args[*curr_arg]);
data/openipmi-2.0.29/lib/ipmi_lan.c:6717:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    len = strlen(args[*curr_arg]);
data/openipmi-2.0.29/lib/ipmi_lan.c:6840:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    len = strlen(args[*curr_arg]);
data/openipmi-2.0.29/lib/ipmi_smi.c:1678:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    should_be_end = value + strlen(value) - 1;
data/openipmi-2.0.29/lib/lanparm.c:227:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slen = strlen(lanparm->name);
data/openipmi-2.0.29/lib/mc.c:457:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slen = strlen(mc->name);
data/openipmi-2.0.29/lib/mc.c:726:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(mc->sel_timer_info->name, mc->name,
data/openipmi-2.0.29/lib/mc.c:1628:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(info->name, mc->name, sizeof(info->name) - 1);
data/openipmi-2.0.29/lib/mc.c:1702:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(info->name, mc->name, sizeof(info->name) - 1);
data/openipmi-2.0.29/lib/normal_fru.c:818:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				      unsigned int      *strlen)	\
data/openipmi-2.0.29/lib/normal_fru.c:824:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                    str, strlen);			\
data/openipmi-2.0.29/lib/normal_fru.c:875:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				       unsigned int      *strlen)	\
data/openipmi-2.0.29/lib/normal_fru.c:881:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                    str, strlen);			\
data/openipmi-2.0.29/lib/normal_fru.c:6536:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*data_len = strlen(str);
data/openipmi-2.0.29/lib/normal_fru.c:6896:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(ipstr);
data/openipmi-2.0.29/lib/oem_atca.c:259:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ipmi_control_set_id(*control, id, IPMI_ASCII_STR, strlen(id));
data/openipmi-2.0.29/lib/oem_atca.c:3625:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			     name, IPMI_ASCII_STR, strlen(name),
data/openipmi-2.0.29/lib/oem_atca.c:3745:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			     name, IPMI_ASCII_STR, strlen(name),
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:1395:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ipmi_sensor_set_id(*sensor, id, IPMI_ASCII_STR, strlen(id));
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:1825:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ipmi_control_set_id(*control, id, IPMI_ASCII_STR, strlen(id));
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:1898:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ipmi_control_set_id(control, id, IPMI_ASCII_STR, strlen(id));
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5121:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 name, IPMI_ASCII_STR, strlen(name),
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5142:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			     name, IPMI_ASCII_STR, strlen(name),
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5196:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			     name, IPMI_ASCII_STR, strlen(name),
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5241:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			     name, IPMI_ASCII_STR, strlen(name),
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5281:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			     name, IPMI_ASCII_STR, strlen(name),
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:5323:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			     name, IPMI_ASCII_STR, strlen(name),
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:6680:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 name, IPMI_ASCII_STR, strlen(name),
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:7966:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 board_name, IPMI_ASCII_STR, strlen(board_name),
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:8532:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 board_name, IPMI_ASCII_STR, strlen(board_name),
data/openipmi-2.0.29/lib/oem_motorola_mxp.c:8961:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    ipmi_set_device_string(str, IPMI_ASCII_STR, strlen(str),
data/openipmi-2.0.29/lib/pef.c:247:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slen = strlen(pef->name);
data/openipmi-2.0.29/lib/pef.c:1501:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen((char *) s1);
data/openipmi-2.0.29/lib/pef.c:1536:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(t);
data/openipmi-2.0.29/lib/pef.c:2426:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    rlen = strlen((char *) pefc->alert_strings[sel]) + 1;
data/openipmi-2.0.29/lib/pet.c:1261:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slen = strlen(pet->name);
data/openipmi-2.0.29/lib/sensor.c:1138:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slen = strlen(sensor->name);
data/openipmi-2.0.29/lib/sensor.c:1432:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	    strncpy(s[p]->id, "**INVALID**", sizeof(s[p]->id));
data/openipmi-2.0.29/lib/sensor.c:1433:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    s[p]->id_len = strlen(s[p]->id);
data/openipmi-2.0.29/lib/solparm.c:227:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slen = strlen(solparm->name);
data/openipmi-2.0.29/lib/strings.c:1282:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	strncpy(buffer, "Success (No error)", buf_len);
data/openipmi-2.0.29/lib/strings.c:1304:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buffer+5, sol_error_codes[sol_err - 1], buf_len-5);
data/openipmi-2.0.29/lib/strings.c:1307:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	strncpy(buffer+9, "Unknown", buf_len-9);
data/openipmi-2.0.29/lib/strings.c:1311:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(err_type);
data/openipmi-2.0.29/lib/strings.c:1324:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return(strlen("Success (No error)"));
data/openipmi-2.0.29/lib/strings.c:1327:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strlen(strerror(IPMI_GET_OS_ERR(err))) + 5;
data/openipmi-2.0.29/lib/strings.c:1334:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strlen(rmcpp_error_codes[rmcpp_err - 1]) + 15;
data/openipmi-2.0.29/lib/strings.c:1339:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strlen(sol_error_codes[sol_err - 1]) + 6;
data/openipmi-2.0.29/lib/strings.c:1341:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strlen("Unknown") + 10;
data/openipmi-2.0.29/sample/eventd.c:86:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int ilen = strlen(indent);
data/openipmi-2.0.29/sample/eventd.c:96:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s = malloc(strlen(instr) + extra + 1);
data/openipmi-2.0.29/sample/eventd.c:578:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    newformat = malloc(strlen(format) + strlen(domainname) + 3);
data/openipmi-2.0.29/sample/eventd.c:578:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    newformat = malloc(strlen(format) + strlen(domainname) + 3);
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:1250:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if (expansion && strlen(expansion)){
data/openipmi-2.0.29/sample/ipmi_serial_bmc_emu.c:1482:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    rv = read(mi->sock, buf, sizeof(buf));
data/openipmi-2.0.29/sample/ipmicmd.c:587:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int count = read(0, input_line+pos, 255-pos);
data/openipmi-2.0.29/sample/solterm.c:622:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (0 == read(STDIN_FILENO, &c, 1))
data/openipmi-2.0.29/sample/solterm.c:806:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(argv[curr_arg]) != 1)
data/openipmi-2.0.29/tcl/tcl_os_hnd.c:225:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rv = read(fd, data, len);
data/openipmi-2.0.29/tcl/tcl_os_hnd.c:577:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	info->gdbm_filename = malloc(strlen(home)+strlen(GDBM_FILE)+2);
data/openipmi-2.0.29/tcl/tcl_os_hnd.c:577:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	info->gdbm_filename = malloc(strlen(home)+strlen(GDBM_FILE)+2);
data/openipmi-2.0.29/tcl/tcl_os_hnd.c:581:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(info->gdbm_filename, "/");
data/openipmi-2.0.29/tcl/tcl_os_hnd.c:610:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gkey.dsize = strlen(key);
data/openipmi-2.0.29/tcl/tcl_os_hnd.c:646:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gkey.dsize = strlen(key);
data/openipmi-2.0.29/ui/ui.c:715:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	count = read(0, &rc, 1);
data/openipmi-2.0.29/ui/ui.c:890:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
get_entity_loc(ipmi_entity_t *entity, char *str, int strlen)
data/openipmi-2.0.29/ui/ui.c:896:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(str, strlen, "r%d.%d.%d.%d",
data/openipmi-2.0.29/ui/ui.c:902:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(str, strlen, "%d.%d",
data/openipmi-2.0.29/ui/ui.c:924:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(name) == 0) {
data/openipmi-2.0.29/ui/ui.c:925:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(name, ipmi_entity_get_entity_id_string(entity), 32);
data/openipmi-2.0.29/ui/ui.c:3182:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 unsigned int *strlen))
data/openipmi-2.0.29/ui/ui.c:3231:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				unsigned int *strlen))
data/openipmi-2.0.29/ui/ui.c:4295:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf+2, mc_toks, sizeof(buf)-2);
data/openipmi-2.0.29/ui/ui.c:4903:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf+2, mc_toks, sizeof(buf)-2);
data/openipmi-2.0.29/ui/ui.c:5088:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						     strlen(str));
data/openipmi-2.0.29/ui/ui.c:6140:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		parms[num_parms][strlen(parms[num_parms])-1] = '\0';
data/openipmi-2.0.29/ui/ui_command.c:93:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    entry->name = ipmi_mem_alloc(strlen(name)+1);
data/openipmi-2.0.29/ui/ui_os.c:236:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rv = read(fd, data, len);
data/openipmi-2.0.29/unix/posix_os_hnd.c:177:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	       int read, int write, int except)
data/openipmi-2.0.29/unix/posix_os_hnd.c:182:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read)
data/openipmi-2.0.29/unix/posix_os_hnd.c:194:48:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    sel_set_fd_read_handler(posix_sel, id->fd, read);
data/openipmi-2.0.29/unix/posix_os_hnd.c:312:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rv = read(fd, data, len);
data/openipmi-2.0.29/unix/posix_os_hnd.c:459:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	info->gdbm_filename = malloc(strlen(home)+strlen(GDBM_FILE)+2);
data/openipmi-2.0.29/unix/posix_os_hnd.c:459:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	info->gdbm_filename = malloc(strlen(home)+strlen(GDBM_FILE)+2);
data/openipmi-2.0.29/unix/posix_os_hnd.c:463:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(info->gdbm_filename, "/");
data/openipmi-2.0.29/unix/posix_os_hnd.c:489:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gkey.dsize = strlen(key);
data/openipmi-2.0.29/unix/posix_os_hnd.c:521:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gkey.dsize = strlen(key);
data/openipmi-2.0.29/unix/posix_thread_os_hnd.c:313:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rv = read(fd, data, len);
data/openipmi-2.0.29/unix/posix_thread_os_hnd.c:722:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	info->gdbm_filename = malloc(strlen(home)+strlen(GDBM_FILE)+2);
data/openipmi-2.0.29/unix/posix_thread_os_hnd.c:722:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	info->gdbm_filename = malloc(strlen(home)+strlen(GDBM_FILE)+2);
data/openipmi-2.0.29/unix/posix_thread_os_hnd.c:726:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(info->gdbm_filename, "/");
data/openipmi-2.0.29/unix/posix_thread_os_hnd.c:755:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gkey.dsize = strlen(key);
data/openipmi-2.0.29/unix/posix_thread_os_hnd.c:791:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gkey.dsize = strlen(key);
data/openipmi-2.0.29/utils/ipmi_malloc.c:439:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *rv = ipmi_mem_alloc(strlen(str)+1);
data/openipmi-2.0.29/utils/ipmi_malloc.c:452:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *rv = ipmi_mem_alloc(strlen(str)+1);

ANALYSIS SUMMARY:

Hits = 1843
Lines analyzed = 181336 in approximately 3.94 seconds (46038 lines/second)
Physical Source Lines of Code (SLOC) = 139847
Hits@level = [0] 838 [1] 267 [2] 1434 [3]  10 [4] 132 [5]   0
Hits@level+ = [0+] 2681 [1+] 1843 [2+] 1576 [3+] 142 [4+] 132 [5+]   0
Hits/KSLOC@level+ = [0+] 19.171 [1+] 13.1787 [2+] 11.2695 [3+] 1.0154 [4+] 0.943889 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.