Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/chain.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/chain.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/mangle.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/mangle.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/options.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/options.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/partiter.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/partiter.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/utility.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/utility.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/display.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/cmenu.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/com32io.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/com32io.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/des.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/des.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/help.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/help.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/syslnx.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/syslnx.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/tui.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/tui.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/simple.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/adv.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/advwrite.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/chainboot.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/cli.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/colors.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/config.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/execute.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/get_key.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/getadv.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/kernel.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/loadhigh.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/msg.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/refstr.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/setadv.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/test_com32.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gdbstub/gdbstub.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gdbstub/main.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gdbstub/serial.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gdbstub/serial.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/acpi.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/boot.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/dsdt.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/ecdt.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/facs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/fadt.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/hpet.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/madt.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/mcfg.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/rsdp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/rsdt.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/sbst.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/slic.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/ssdt.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/structs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/tcpa.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/xsdt.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/cpuid.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/disk/bootloaders.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/disk/common.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/disk/errno_disk.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/disk/error.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/disk/geom.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/disk/mbrs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/disk/msdos.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/disk/partition.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/disk/read.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/disk/swsusp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/disk/util.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/disk/write.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_base_board.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_battery.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_bios.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_cache.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_chassis.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_ipmi.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_processor.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/memory.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/vpd/vpd.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/zzjson/zzjson.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/dsdt.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/ecdt.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/facs.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/fadt.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/madt.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/rsdp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/rsdt.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/sbst.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/xsdt.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/cpuid.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/ata.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/bootloaders.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/errno_disk.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/error.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/geom.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/labels.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/mbrs.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/msdos.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/read.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/swsusp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/util.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/write.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_base_board.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_battery.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_bios.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_cache.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_chassis.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_ipmi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_processor.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/memory.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/vpd/vpd.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/zzjson/zzjson_create.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/zzjson/zzjson_free.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/zzjson/zzjson_print.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/zzjson/zzjson_query.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/zzjson/zzjson_parse.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-ata.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-ata.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-acpi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-cpu.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-disk.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-hdt.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-memory.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-pci.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-pxe.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-syslinux.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-vesa.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-vpd.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-cpu.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-disks.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-hdt.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-kernel.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-memory.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-pci.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-pxe.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-syslinux.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-vesa.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-vpd.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-about.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-acpi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-kernel.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-pci.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-processor.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-pxe.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-syslinux.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-vesa.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-vpd.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-util.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-util.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/alloca.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/assert.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/bitsize/limits.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/bitsize/stddef.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/bitsize/stdint.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/bitsize/stdintconst.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/bitsize/stdintlimits.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/bitsize32/limits.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/bitsize32/stddef.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/bitsize32/stdint.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/bitsize32/stdintconst.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/bitsize32/stdintlimits.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/bitsize64/limits.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/bitsize64/stddef.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/bitsize64/stdint.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/bitsize64/stdintconst.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/bitsize64/stdintlimits.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/bufprintf.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/byteswap.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/cli.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/colortbl.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/com32.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/console.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/cpufeature.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/ctype.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/dev.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/dhcp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/dirent.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/dprintf.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/elf.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/endian.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/errno.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/fcntl.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/getopt.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/gzguts.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/hw/vga.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/ilog2.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/inttypes.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/klibc/archsetjmp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/klibc/compiler.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/klibc/diverr.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/klibc/endian.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/klibc/extern.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/klibc/i386/archsetjmp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/klibc/sysconfig.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/klibc/x86_64/archsetjmp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/libansi.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/limits.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/linux/list.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/math.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/menu.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/minmax.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/netinet/in.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/png.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pngconf.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pngdebug.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pnginfo.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pnglibconf.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pngpriv.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pngstruct.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/refstr.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/setjmp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sort.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdarg.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdbool.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stddef.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdint.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdio.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdlib.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/string.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/suffix_number.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/bitops.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/dirent.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/elf32.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/elf64.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/elfcommon.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/exec.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/fpu.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/gpxe.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/io.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/module.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/module32.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/module64.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/pci.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/stat.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/time.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/times.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/types.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/adv.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/advconst.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/align.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/boot.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/bootpm.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/bootrm.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/config.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/debug.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/disk.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/firmware.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/idle.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/io.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/keyboard.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/linux.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/loadfile.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/memscan.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/movebits.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/pmapi.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/pxe.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/pxe_api.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/reboot.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/resolve.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/sysappend.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/version.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/vesacon.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/video.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/zio.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/time.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/tinyjpeg.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/unistd.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/x86/bitops.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/x86/cpu.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/x86/regs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/zconf.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/zlib.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/abort.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/asprintf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/atexit.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/atexit.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/atoi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/atol.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/atoll.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/atox.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/bufprintf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/calloc.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/chrreplace.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/creat.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/ctypes.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/dhcppack.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/dhcpunpack.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/dprintf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/exit.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fclose.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fdopendir.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fgetc.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fgets.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fopen.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fopendev.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fprintf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fputc.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fputs.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fread.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fread2.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fwrite.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fwrite2.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/getcwd.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/getopt.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/getopt_long.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/i386/libgcc/__divdi3.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/i386/libgcc/__moddi3.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/i386/libgcc/__udivdi3.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/i386/libgcc/__udivmoddi4.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/i386/libgcc/__umoddi3.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/i386/math/init_fpu.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/inet.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/bgr24.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/bgra32.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/decode1.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/decode3.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/grey.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/jidctflt.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/rgb24.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/rgba32.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/tinyjpeg-internal.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/tinyjpeg.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/yuv420p.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/example.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/png.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pnggccrd.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngget.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngmem.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngpread.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngread.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngrio.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngrtran.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngrutil.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngtest.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngtrans.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngvcrd.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwio.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwrite.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwtran.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwutil.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/lmalloc.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/lrand48.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/lstrdup.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/malloc.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/math/strtod.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/memccpy.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/memchr.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/memcmp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/memcpy.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/memmem.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/memmove.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/mempcpy.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/memset.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/memswap.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/onexit.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/bios.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/cfgtype.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/pci.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/readb.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/readl.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/readw.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/readx.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/writeb.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/writel.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/writew.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/writex.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/perror.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/printf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/putchar.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/puts.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/qsort.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/seed48.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/skipspace.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/snprintf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sprintf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/srand48.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sscanf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/stack.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/stpcpy.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/stpncpy.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strcasecmp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strcat.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strchr.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strcmp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strcpy.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strdup.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strerror.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strlcat.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strlcpy.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strlen.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strncasecmp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strncat.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strncmp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strncpy.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strndup.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strnlen.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strntoimax.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strntoumax.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strrchr.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strreplace.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strsep.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strspn.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strstr.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strtoimax.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strtok.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strtol.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strtoll.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strtoul.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strtoull.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strtoumax.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strtox.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/suffix_number.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/ansi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/ansi.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/ansicon_write.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/ansiserial_write.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/argv.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/cfarcall.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/close.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/colortable.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/err_read.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/err_write.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/farcall.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/file.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/fileclose.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/fileinfo.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/fileread.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/fstat.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/ftell.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/gpxe.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/intcall.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/isatty.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/libansi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/line_input.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/common.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/common.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/elf_module.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/elfutils.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/elfutils.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/exec.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/i386/elf_module.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/x86_64/elf_module.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/null_read.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/null_write.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/open.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/openconsole.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/opendev.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/openmem.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/rawcon_read.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/rawcon_write.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/read.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/screensize.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/serial_write.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/sleep.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/stdcon_read.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/stdcon_write.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/background.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/debug.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/drawtxt.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/fill.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/fmtpixel.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/i915resolution.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/initvesa.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/screencpy.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/vesa.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/video.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesacon_write.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesaserial_write.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/write.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/xserial_write.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/zeroregs.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/zfile.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/zfopen.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/addlist.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/biosboot.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/cleanup.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/debug.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/disk.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/dsinfo.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/dump_mmap.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/dump_movelist.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/floadfile.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/freelist.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/idle.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_archive.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_loadfile.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/ipappend.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/keyboard.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/load_linux.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/loadfile.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/localboot.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/memmap.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/memscan.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/movebits.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/pxe_get_cached.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/pxe_get_nic.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/reboot.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/run_command.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/run_default.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/runimage.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/serial.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/setup_data.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/shuffle.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/shuffle_pm.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/shuffle_rm.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/version.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/video/fontquery.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/video/reportmode.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/zloadfile.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/zonelist.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vasprintf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vdprintf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vfprintf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vprintf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vsnprintf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vsprintf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vsscanf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/x86_64/math/init_fpu.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/adler32.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/compress.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/crc32.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/crc32.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/deflate.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/deflate.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/infback.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/inffast.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/inffast.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/inffixed.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/inflate.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/inflate.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/inftrees.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/inftrees.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/trees.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/trees.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/uncompr.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/zconf.in.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/zutil.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/zutil.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/cpio.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/ctime.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/ctime.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/serial.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/serial.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/srecsend.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/tftp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/upload_backend.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/upload_srec.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/upload_tftp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/upload_ymodem.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/zout.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/ansiline.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/ansiraw.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/base64.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/crypt-md5.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/include/base64.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/include/consoles.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/include/getkey.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/include/libutil.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/include/md5.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/include/minmax.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/include/sha1.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/include/xcrypt.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/keyname.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/md5.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/quicksort.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha1hash.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/unbase64.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/cmenu.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/cpu.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dmi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lapi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lapi.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lauxlib.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lauxlib.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lbaselib.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lbitlib.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lcode.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lcode.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lcorolib.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lctype.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lctype.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ldblib.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ldebug.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ldebug.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ldo.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ldo.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ldump.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lfs.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lfunc.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lfunc.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lgc.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lgc.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/linit.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/liolib.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/llex.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/llex.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/llimits.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lmathlib.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lmem.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lmem.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loadlib.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lobject.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lobject.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lopcodes.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lopcodes.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loslib.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lparser.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lparser.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstate.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstate.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstring.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstring.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ltable.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ltable.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ltablib.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ltm.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ltm.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lua.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lua.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lua.hpp Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/luac.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/luaconf.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lualib.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lundump.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lundump.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lvm.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lvm.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lzio.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lzio.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/pci.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/syslinux.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/vesa.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/mboot/apm.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/mboot/initvesa.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/mboot/map.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/mboot/mb_header.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/mboot/mb_info.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/mboot/mboot.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/mboot/mboot.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/mboot/mem.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/mboot/solaris.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/mboot/syslinux.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/mboot/vesa.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/background.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/colors.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/drain.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/menu.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/menumain.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/passwd.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/printmsg.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/refstr.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/vesamenu.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/cat.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/cmd.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/config.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/cptime.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/cpuid.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/cpuidtest.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/debug.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/dir.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/disk.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/dmi_utils.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/dmitest.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/elf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ethersel.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/gpxecmd.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/hexdump.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/host.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ifcpu.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ifcpu64.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ifmemdsk.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ifplop.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/kbdmap.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/kontron_wdt.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/kontron_wdt.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/linux.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ls.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/meminfo.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pcitest.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pmload.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/poweroff.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/prdhcp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pwd.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/reboot.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/sanboot.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/sdi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/vesainfo.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/vpdtest.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/whichsys.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/zzjson.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/samples/advdump.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/samples/entrydump.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/samples/fancyhello.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/samples/hello.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/samples/keytest.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/samples/localboot.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/samples/resolv.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/samples/serialinfo.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/acpi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/cpuid.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/dmi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/main.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/memmap.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/memory.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/pci.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/rbtree.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/rbtree.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/sysdump.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/vesa.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/tools/include/tools/le_byteshift.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/bios.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/call16.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/cleanup.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/conio.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/console.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/debug.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/dmi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/elflink/common.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/elflink/elfutils.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/elflink/load_env32.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/errno.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/font.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/btrfs/btrfs.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/btrfs/btrfs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/btrfs/crc32c.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/cache.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/chdir.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/diskio.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/diskio_bios.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ext2/bmap.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ext2/ext2.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ext2/ext2_fs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fat/fat.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fat/fat_fs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fs.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/getcwd.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/getfssec.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/iso9660/iso9660.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/iso9660/iso9660_fs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/iso9660/susp_rr.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/iso9660/susp_rr.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/lib/chdir.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/lib/close.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/lib/loadconfig.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/lib/mangle.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/lib/searchconfig.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/nonextextent.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ntfs/ntfs.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ntfs/ntfs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ntfs/runlist.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/bios.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/core.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/dhcp_option.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/dnsresolv.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/ftp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/ftp_readdir.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/gpxeurl.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/http.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/http_readdir.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/idle.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/isr.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/tcp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/tftp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/tftp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/url.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/urlparse.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/readdir.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ufs/bmap.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ufs/ufs.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ufs/ufs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/misc.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_ag.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_dinode.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_dinode.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_dir2.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_dir2.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_fs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_readdir.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_readdir.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_sb.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_types.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/graphics.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/hello.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/idle.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/bios.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/cache.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/codepage.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/core.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/ctype.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/disk.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/fs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/graphics.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/kaboom.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/localboot.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/mbox.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/net.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/pmapi.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/thread.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/timer.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/init.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/isolinux-c.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/kaboom.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/ldlinux-c.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/legacynet/core.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/legacynet/dnsresolv.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/legacynet/idle.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/legacynet/portnum.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/localboot.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/api/api_lib.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/api/api_msg.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/api/err.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/api/netbuf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/api/netdb.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/api/netifapi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/api/sockets.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/api/tcpip.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/arch/sys_arch.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/def.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/dhcp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/dns.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/init.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/ipv4/autoip.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/ipv4/icmp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/ipv4/igmp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/ipv4/inet.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/ipv4/inet_chksum.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/ipv4/ip.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/ipv4/ip_addr.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/ipv4/ip_frag.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/mem.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/memp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/netif.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/pbuf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/raw.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/snmp/asn1_dec.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/snmp/asn1_enc.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/snmp/mib2.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/snmp/mib_structs.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/snmp/msg_in.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/snmp/msg_out.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/stats.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/sys.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/tcp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/tcp_in.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/tcp_out.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/timers.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/udp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/arch/cc.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/arch/perf.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/arch/sys_arch.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/ipv4/lwip/autoip.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/ipv4/lwip/icmp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/ipv4/lwip/igmp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/ipv4/lwip/inet.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/ipv4/lwip/inet_chksum.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/ipv4/lwip/ip.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/ipv4/lwip/ip_addr.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/ipv4/lwip/ip_frag.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/api.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/api_msg.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/arch.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/debug.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/def.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/dhcp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/dns.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/err.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/init.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/mem.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/memp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/memp_std.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/netbuf.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/netdb.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/netif.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/netifapi.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/opt.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/pbuf.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/raw.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/sio.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/snmp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/snmp_asn1.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/snmp_msg.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/snmp_structs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/sockets.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/stats.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/sys.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/tcp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/tcp_impl.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/tcpip.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/timers.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/udp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwipopts.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/netif/etharp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/netif/ppp_oe.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/netif/slipif.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/etharp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ethernetif.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/chap.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/chap.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/chpms.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/chpms.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/fsm.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/fsm.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ipcp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ipcp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/lcp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/lcp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/magic.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/magic.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/md5.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/md5.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/pap.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/pap.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp_oe.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/pppdebug.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/randm.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/randm.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/vj.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/vj.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/slipif.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/undiif.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lzo/lzo_asm.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/mem/free.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/mem/init.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/mem/malloc.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/mem/malloc.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/path.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/plaincon.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/pmapi.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/pxeboot.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/pxelinux-c.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/rawcon.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/rllpack.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/serirq.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/strcasecmp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/sysappend.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/thread/exit_thread.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/thread/idle_thread.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/thread/kill_thread.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/thread/mbox.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/thread/root_thread.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/thread/schedule.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/thread/semaphore.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/thread/start_thread.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/thread/timeout.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/writehex.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/writestr.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/diag/geodsp/mk-lba-img.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/__divdi3.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/__udivmoddi4.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/argv.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/atou.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/code16.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/conio.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/ctype.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/errno.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/free.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/getsetsl.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/inttypes.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/malloc.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/malloc.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/mystuff.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/perror.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/printf.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/skipatou.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/stdint.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/stdio.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/stdlib.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/strchr.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/strntoumax.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/strtoul.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/sysexits.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/syslinux.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/string.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dosutil/mdiskchk.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dummy.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/adv.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/adv.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/console.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/cp865_8x16.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/derivative.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/diskio.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/efi.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/fio.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/fio.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/main.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/mem.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/pxe.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/tcp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/udp.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/vesa.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/wrapper.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/wrapper.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/btrfs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/fat.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/misc.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/mountinfo.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/mountinfo.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/ntfs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/ufs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/ufs_fs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/xfs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/xfs_fs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/xfs_sb.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/xfs_types.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/cache.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/fat.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/fatchain.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/libfat.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/libfatint.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/open.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/searchdir.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/ulint.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/advio.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/ext2fs/ext2_fs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/fs.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/getopt/getopt.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/getopt/getopt_long.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/linux/fiemap.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/linux/loop.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/linuxioctl.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/setadv.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/setadv.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslinux.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxcom.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxcom.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxfs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxint.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxmod.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxopt.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxopt.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxrw.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxrw.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzo1.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzo1a.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzo1b.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzo1c.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzo1f.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzo1x.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzo1y.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzo1z.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzo2a.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzo_asm.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzoconf.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzodefs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzoutil.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/prepcore.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/compr1b.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/compr1c.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/config1x.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo1x_1.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo1x_1k.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo1x_1l.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo1x_1o.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo1x_9x.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo1x_d1.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo1x_d2.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo1x_d3.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo1x_o.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_conf.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_crc.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_dict.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_func.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_init.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_ptr.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_ptr.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_str.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_util.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/stats1a.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/stats1b.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/stats1c.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mbr/adjust.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/acpi.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/bda.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/compiler.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/conio.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/conio.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/ctypes.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/dskprobe.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/dskprobe.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/e820.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/e820func.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/e820test.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/eltorito.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/eltorito.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/inflate.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/memcpy.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/memdisk.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/memmove.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/memset.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/msetup.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/mstructs.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/setup.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/strntoumax.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/strtoull.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/strtox.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/suffix_number.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/unzip.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/version.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/gethostip.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/memdiskfind.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/win/hello.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/win/ntfssect.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/win/ntfssect.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/win/ntfstest.c Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/win/sysexits.h Examining data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/win/syslinux.c FINAL RESULTS: data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c:66:6: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(kernel_modules, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c:76:6: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(buffer, kernel_modules, sizeof(kernel_modules)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c:114:6: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(kernel_modules, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c:122:6: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(modules[pci_device->class[2]], kernel_modules, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-pci.c:104:2: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(kernel_modules, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-pci.c:184:6: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(kernel_modules, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-pci.c:84:6: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(kernel_modules, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-kernel.c:65:3: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(kernel_modules, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-pci.c:109:6: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(kernel_modules, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-pci.c:164:6: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(kernel_modules, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:175:3: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(kernel_modules, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pcitest.c:77:6: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(kernel_modules, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fs.c:270:28: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. if (!this_fs->fs_ops->readlink || data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fs.c:280:32: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. copied = this_fs->fs_ops->readlink(inode, new_path); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/fs.h:68:16: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. int (*readlink)(struct inode *, char *); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:1189:12: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. llen = readlink(sysname, linkname, sizeof linkname); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/mangle.c:219:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char *)stage2->config_file, opt.grubcfg); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/partiter.c:595:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(errbuf, "Unable to read %s GPT header.", desc); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/partiter.c:599:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(errbuf, "Invalid checksum of %s GPT header.", desc); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/partiter.c:603:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(errbuf, "Checksum of %s GPT header is valid, but values fail sanity checks.", desc); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/partiter.c:636:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(errbuf, "Unable to read %s GPT partition list.", desc); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/partiter.c:640:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(errbuf, "Invalid checksum of %s GPT partition list.", desc); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:122:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(username, login); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:125:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(username, GUEST_USER); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:128:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(username, GUEST_USER); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:181:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(infoline, (char *)(((t_menuitem *) v)->data)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:258:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(username, GUEST_USER); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:418:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cmd, curr->data); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:420:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmd, infoline); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:427:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmd, ip); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/des.c:950:7: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. char *crypt(const char *key, const char *setting) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/des.h:6:14: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. extern char *crypt(const char *key, const char *salt); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/help.c:112:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(CSI "?7l"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/help.c:121:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(line, "Error reading file or file not found\n file=%s", filename); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/help.c:205:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fullname, helpbasedir); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/help.c:207:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(fullname, filename); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/help.c:224:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(helpbasedir, helpdir); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:648:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(CSI "?7l"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:681:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ms->title, TITLESTR); // Copy string data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:683:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ms->title, title); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1043:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m->title, TITLELONG); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1045:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m->title, title); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1047:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m->title, EMPTYSTR); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1066:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m->name, name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1132:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mi->item, ITEMLONG); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1134:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mi->item, item); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1139:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mi->item, EMPTYSTR); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1143:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mi->status, STATUSLONG); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1145:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mi->status, status); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1148:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mi->status, EMPTYSTR); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1177:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mi->data, ACTIONLONG); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1179:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mi->data, data); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1182:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mi->data, EMPTYSTR); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1258:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(line, app); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.c:35:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(salt, userdb[i]->pwdhash); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.c:37:37: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. if (strcmp(userdb[i]->pwdhash, crypt(pwd, salt)) == 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.c:57:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dperm + 1, perm); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.c:134:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(userdb[numusers]->username, user); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.c:135:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(userdb[numusers]->pwdhash, pwdhash); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.c:141:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(userdb[numusers]->perms + 1, perms); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/syslnx.c:31:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bounce, cmd); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/tui.c:51:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(str, stra); // If show old value copy current value data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/tui.c:205:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(stra, str); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/cli.c:357:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cmdline, comm_counter->command); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/cli.c:379:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cmdline, comm_counter->command); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/cli.c:394:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cmdline, p); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/cli.c:469:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(comm_counter->command, ret); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/kernel.c:49:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(cmdline, "BOOT_IMAGE=%s %s", kernel_name, args); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c:131:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(k + len, p); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:405:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. ipp += sprintf(ipp, " initrd=%s", ld->initrd); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1466:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ConfigName, filename); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/refstr.c:74:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. len = vsnprintf(NULL, 0, fmt, ap1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/refstr.c:81:12: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. return vsnprintf(p, len + 1, fmt, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/test_com32.c:9:34: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define INFO_PRINT(fmt, args...) printf("[COM32] " fmt, ##args) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:467:30: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if(menu_ptr->menu_label) strcpy(gfx_menu.label_list + u * gfx_menu.label_size, menu_ptr->menu_label); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:468:26: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if(menu_ptr->append) strcpy(gfx_menu.arg_list + u * gfx_menu.arg_size, menu_ptr->append); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:863:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(arg + strlen(arg), " %s", ipappend->ptr[i]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi.h:43:182: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define moreprintf(...) do { display_line++; if (display_line == 24) { char tempbuf[10]; display_line=0; printf("Press enter to continue"); fgets(tempbuf, sizeof tempbuf, stdin);} printf ( __VA_ARGS__); } while (0); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi.h:63:14: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. s_system system; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:57:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, args); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/cpuid.c:332:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, Cx86_model[dir0_msn & 7]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/cpuid.c:333:10: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). if (p) strcat(buf, p); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:162:16: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. snprintf(dmi->system.configuration_options, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:164:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dmi->system.configuration_options, prefix, dmi_string(h, i)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:252:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sprintf(dmi->system.uuid, "Not Present"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:256:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sprintf(dmi->system.uuid, "Not Settable"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:260:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sprintf(dmi->system.uuid, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:282:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. strlcpy(dmi->system.wakeup_type, type[code], data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:283:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sizeof(dmi->system.wakeup_type)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:285:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. strlcpy(dmi->system.wakeup_type, out_of_spec, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:286:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sizeof(dmi->system.wakeup_type)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:557:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. memset(&dmi->system, 0, sizeof(s_system)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:567:10: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dmi->system.filled = false; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:644:7: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dmi->system.filled = true; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:645:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. strlcpy(dmi->system.manufacturer, dmi_string(h, data[0x04]), data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:646:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sizeof(dmi->system.manufacturer)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:647:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. strlcpy(dmi->system.product_name, dmi_string(h, data[0x05]), data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:648:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sizeof(dmi->system.product_name)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:649:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. strlcpy(dmi->system.version, dmi_string(h, data[0x06]), data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:650:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sizeof(dmi->system.version)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:651:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. strlcpy(dmi->system.serial, dmi_string(h, data[0x07]), data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:652:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sizeof(dmi->system.serial)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:659:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. strlcpy(dmi->system.sku_number, dmi_string(h, data[0x19]), data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:660:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sizeof(dmi->system.sku_number)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:661:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. strlcpy(dmi->system.family, dmi_string(h, data[0x1A]), data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:662:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sizeof(dmi->system.family)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:938:7: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dmi->system.system_reset.filled = true; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:939:7: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dmi->system.system_reset.status = data[0x04] & (1 << 0); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:940:7: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dmi->system.system_reset.watchdog = data[0x04] & (1 << 5); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:943:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. strlcpy(dmi->system.system_reset.boot_option, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:945:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sizeof dmi->system.system_reset.boot_option); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:946:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. strlcpy(dmi->system.system_reset.boot_option_on_limit, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:948:15: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sizeof dmi->system.system_reset.boot_option_on_limit); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:950:16: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dmi->system.system_reset.reset_count, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:951:23: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sizeof(dmi->system.system_reset.reset_count)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:953:16: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dmi->system.system_reset.reset_limit, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:954:23: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sizeof(dmi->system.system_reset.reset_limit)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:956:16: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dmi->system.system_reset.timer_interval, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:957:23: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sizeof(dmi->system.system_reset.timer_interval)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:959:16: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dmi->system.system_reset.timeout, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:960:23: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. sizeof(dmi->system.system_reset.timeout)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:982:42: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dmi_system_boot_status(data[0x0A], dmi->system.system_boot_status); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_battery.c:53:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(capacity, "%s", "Unknown"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_battery.c:61:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(voltage, "%s", "Unknown"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_battery.c:69:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(error, "%s", "Unknown"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_cache.c:80:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(array, "%s%s", sep, types[i]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:35:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(array, "%s", "Not Provided"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:37:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(array, "%s", "No Error"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:49:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(width, "%s", "Unknown"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:57:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(size, "%s", "Free"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:59:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(size, "%s", "Unknown"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:97:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(set, "%s", "None"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:99:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(set, "%s", "Unknown"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:167:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(type_detail, "%s", "None"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:180:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(speed, "%s", "Unknown"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:207:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(type, "%s", "None"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:220:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(connection, "%s", "None"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:232:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(speed, "%s", "Unknown"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:242:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(size, "%s", "Not Determinable"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:245:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(size, "%s", "Disabled"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:248:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(size, "%s", "Not Installed"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:263:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(error, "%s", "See Event Log\n"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:266:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(error, "%s", "OK\n"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:268:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(error, "%sUncorrectable Errors\n", prefix); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:270:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(error, "%sCorrectable Errors\n", prefix); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_processor.c:415:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(cache, "No %s Cache", level); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-cpu.c:95:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buffer, flag_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:67:23: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (hardware->dmi.system.filled == true) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:124:23: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (hardware->dmi.system.filled == false) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:131:55: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. more_printf(" Manufacturer : %s\n", hardware->dmi.system.manufacturer); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:132:55: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. more_printf(" Product Name : %s\n", hardware->dmi.system.product_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:133:55: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. more_printf(" Version : %s\n", hardware->dmi.system.version); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:134:55: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. more_printf(" Serial : %s\n", hardware->dmi.system.serial); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:135:55: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. more_printf(" UUID : %s\n", hardware->dmi.system.uuid); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:136:55: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. more_printf(" Wakeup Type : %s\n", hardware->dmi.system.wakeup_type); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:137:55: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. more_printf(" SKU Number : %s\n", hardware->dmi.system.sku_number); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:138:55: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. more_printf(" Family : %s\n", hardware->dmi.system.family); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:140:30: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (strlen(hardware->dmi.system.configuration_options)) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:142:36: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. more_printf("%s\n", hardware->dmi.system.configuration_options); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:145:23: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (hardware->dmi.system.system_reset.filled) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:148:22: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. (hardware->dmi.system.system_reset. data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:151:22: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. (hardware->dmi.system.system_reset. data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:153:27: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (strlen(hardware->dmi.system.system_reset.boot_option)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:155:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. hardware->dmi.system.system_reset.boot_option); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:156:27: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (strlen(hardware->dmi.system.system_reset.boot_option_on_limit)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:158:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. hardware->dmi.system.system_reset.boot_option_on_limit); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:159:27: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (strlen(hardware->dmi.system.system_reset.reset_count)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:161:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. hardware->dmi.system.system_reset.reset_count); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:162:27: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (strlen(hardware->dmi.system.system_reset.reset_limit)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:164:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. hardware->dmi.system.system_reset.reset_limit); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:165:27: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (strlen(hardware->dmi.system.system_reset.timer_interval)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:167:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. hardware->dmi.system.system_reset.timer_interval); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:168:27: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (strlen(hardware->dmi.system.system_reset.timeout)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:170:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. hardware->dmi.system.system_reset.timeout); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:175:17: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. hardware->dmi.system.system_boot_status); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-hdt.c:206:52: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. more_printf(" Manufacturer : %s\n", hardware->dmi.system.manufacturer); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-hdt.c:207:52: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. more_printf(" Product Name : %s\n", hardware->dmi.system.product_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-hdt.c:208:52: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. more_printf(" Serial : %s\n", hardware->dmi.system.serial); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-hdt.c:303:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(text_to_say, argument); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-hdt.c:309:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(text_to_say, argument); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:550:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(autocomplete_full_line, "%s %s", data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:565:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(autocomplete_full_line, "%s %s", data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:775:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(commands[nb_commands], "%s", remove_spaces(mypch)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:133:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(hardware->postexec, argument); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:140:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(hardware->postexec, argument); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:155:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(hardware->auto_label, argument); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:162:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(hardware->auto_label, argument); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h:127:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(__VA_ARGS__);\ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:348:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (hardware->dmi.system.filled == false) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:356:80: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. snprintf(system_reset_status,sizeof(system_reset_status),"%s", (hardware->dmi.system.system_reset.status ? "Enabled" :"Disabled")); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:357:70: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. snprintf(watchdog_timer,sizeof(watchdog_timer),"%s", (hardware->dmi.system.system_reset.watchdog ? "Present" :"Not Present")); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:361:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. add_hs(dmi.system.manufacturer); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:362:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. add_hs(dmi.system.product_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:363:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. add_hs(dmi.system.version); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:364:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. add_hs(dmi.system.serial); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:365:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. add_hs(dmi.system.uuid); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:366:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. add_hs(dmi.system.wakeup_type); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:367:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. add_hs(dmi.system.sku_number); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:368:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. add_hs(dmi.system.family); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:369:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. add_hs(dmi.system.configuration_options); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:372:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. add_hs(dmi.system.system_reset.boot_option); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:373:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. add_hs(dmi.system.system_reset.boot_option_on_limit); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:374:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. add_hs(dmi.system.system_reset.reset_count); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:375:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. add_hs(dmi.system.system_reset.reset_limit); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:376:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. add_hs(dmi.system.system_reset.timer_interval); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:377:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. add_hs(dmi.system.system_reset.timeout); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:378:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. add_hs(dmi.system.system_boot_status); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump.c:52:42: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dump_options[1].item = hardware->dmi.system.manufacturer; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump.c:55:42: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dump_options[2].item = hardware->dmi.system.product_name; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump.c:70:42: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dump_options[7].item = hardware->dmi.system.sku_number; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump.c:73:42: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dump_options[8].item = hardware->dmi.system.serial; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:41:60: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. snprintf(buffer, sizeof buffer, "Vendor : %s", dmi->system.manufacturer); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:43:12: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dmi->system.manufacturer); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:47:60: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. snprintf(buffer, sizeof buffer, "Product : %s", dmi->system.product_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:49:12: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dmi->system.product_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:53:60: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. snprintf(buffer, sizeof buffer, "Version : %s", dmi->system.version); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:54:65: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. snprintf(statbuffer, sizeof statbuffer, "Version: %s", dmi->system.version); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:58:60: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. snprintf(buffer, sizeof buffer, "Serial : %s", dmi->system.serial); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:60:12: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dmi->system.serial); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:64:60: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. snprintf(buffer, sizeof buffer, "UUID : %s", dmi->system.uuid); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:65:62: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. snprintf(statbuffer, sizeof statbuffer, "UUID: %s", dmi->system.uuid); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:69:60: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. snprintf(buffer, sizeof buffer, "Wakeup : %s", dmi->system.wakeup_type); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:71:12: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dmi->system.wakeup_type); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:75:60: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. snprintf(buffer, sizeof buffer, "SKU Number: %s", dmi->system.sku_number); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:77:12: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. dmi->system.sku_number); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:81:60: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. snprintf(buffer, sizeof buffer, "Family : %s", dmi->system.family); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:82:64: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. snprintf(statbuffer, sizeof statbuffer, "Family: %s", dmi->system.family); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-processor.c:47:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buffer, flag_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:60:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(features, "%d core%s, %dK L2 Cache", hardware->cpu.num_cores, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:79:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. hardware->dmi.system.manufacturer); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:81:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. hardware->dmi.system.manufacturer); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:86:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. hardware->dmi.system.product_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:88:45: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. "System Product Name: %s", hardware->dmi.system.product_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:93:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. hardware->dmi.system.serial); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:95:46: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. "System Serial Number: %s", hardware->dmi.system.serial); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu.c:75:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cmd, curr->data); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu.c:157:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (hardware->dmi.system.filled == true) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu.c:236:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (hardware->dmi.system.filled == true) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/dprintf.h:19:20: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define dprintf printf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/dprintf.h:20:20: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define vdprintf vprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/dprintf.h:25:27: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define ddprintf(...) { printf(__VA_ARGS__); dprintf(__VA_ARGS__); } data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/dprintf.h:32:9: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(__VA_ARGS__) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/dprintf.h:35:9: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, ap) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/dprintf.h:36:18: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define ddprintf printf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/gzguts.h:86:18: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # if !defined(vsnprintf) && !defined(NO_vsnprintf) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/gzguts.h:88:18: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/gzguts.h:110:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/gzguts.h:110:20: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/libansi.h:92:9: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(CSI "%dS", times); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/libansi.h:98:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(CSI "S"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/libansi.h:103:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(CSI "%d;%dH", row + 1, col + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pngdebug.h:84:8: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(PNG_DEBUG_FILE,"%s" m PNG_STRING_NEWLINE,(num_tabs==1 ? " " : \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pngdebug.h:92:8: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(PNG_DEBUG_FILE,"%s" m PNG_STRING_NEWLINE,(num_tabs==1 ? " " : \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pngdebug.h:100:8: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(PNG_DEBUG_FILE,"%s" m PNG_STRING_NEWLINE,(num_tabs==1 ? " " : \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pngdebug.h:113:8: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(PNG_DEBUG_FILE,format); \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pngdebug.h:124:8: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(PNG_DEBUG_FILE,format,p1); \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pngdebug.h:135:8: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(PNG_DEBUG_FILE,format,p1,p2); \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdio.h:91:14: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. __extern int printf(const char *, ...); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdio.h:92:14: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. __extern int vprintf(const char *, va_list); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdio.h:93:14: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. __extern int fprintf(FILE *, const char *, ...); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdio.h:94:14: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. __extern int vfprintf(FILE *, const char *, va_list); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdio.h:95:14: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. __extern int sprintf(char *, const char *, ...); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdio.h:96:14: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. __extern int vsprintf(char *, const char *, va_list); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdio.h:97:14: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. __extern int snprintf(char *, size_t n, const char *, ...); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdio.h:98:14: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. __extern int vsnprintf(char *, size_t n, const char *, va_list); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdio.h:115:14: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. __extern int sscanf(const char *, const char *, ...); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdio.h:116:14: [4] (buffer) vsscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. __extern int vsscanf(const char *, const char *, va_list); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/string.h:22:16: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). __extern char *strcat(char *, const char *); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/string.h:25:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). __extern char *strcpy(char *, const char *); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/asprintf.c:19:13: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. bytes = vsnprintf(NULL, 0, format, ap1) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/asprintf.c:26:7: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. rv = vsnprintf(p, bytes, format, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/bufprintf.c:12:10: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. rv = vsnprintf(NULL, 0, format, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/bufprintf.c:29:10: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. rv = vsnprintf(buf->buf + buf->len, buf->size - buf->len, format, ap2); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fprintf.c:8:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int fprintf(FILE * file, const char *format, ...) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fprintf.c:14:10: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. rv = vfprintf(file, format, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/tinyjpeg-internal.h:157:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(error_string, sizeof(error_string), fmt, ## args); \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/tinyjpeg-internal.h:162:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, fmt, ## args); \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:734:10: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, PNG_STRING_NEWLINE); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:741:10: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, PNG_STRING_NEWLINE); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:749:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, PNG_STRING_NEWLINE); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:805:10: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, PNG_STRING_NEWLINE); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:812:10: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, PNG_STRING_NEWLINE); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:820:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, PNG_STRING_NEWLINE); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngtest.c:92:42: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define pngtest_debug(m) ((void)fprintf(stderr, m "\n")) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngtest.c:93:42: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define pngtest_debug1(m,p1) ((void)fprintf(stderr, m "\n", p1)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngtest.c:94:42: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define pngtest_debug2(m,p1,p2) ((void)fprintf(stderr, m "\n", p1, p2)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngtest.c:138:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ts, str); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:124:37: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). case 0:chrreplace(result,'-','_');strcpy(module_name,result); break; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:125:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). case 1:strcpy(vendor_id,result); break; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:126:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). case 2:strcpy(product_id,result); break; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:127:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). case 3:strcpy(sub_vendor_id,result); break; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:128:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). case 4:strcpy(sub_product_id,result); break; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:161:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dev->dev_info->linux_kernel_module[dev->dev_info->linux_kernel_module_count], module_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:686:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(module_name,result+1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:723:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dev->dev_info->linux_kernel_module[dev->dev_info->linux_kernel_module_count], module_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/printf.c:8:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int printf(const char *format, ...) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/printf.c:14:10: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. rv = vfprintf(stdout, format, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/snprintf.c:7:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. int snprintf(char *buffer, size_t n, const char *format, ...) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/snprintf.c:13:10: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. rv = vsnprintf(buffer, n, format, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sprintf.c:8:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. int sprintf(char *buffer, const char *format, ...) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sprintf.c:14:10: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. rv = vsnprintf(buffer, ~(size_t) 0, format, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sscanf.c:7:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int sscanf(const char *str, const char *format, ...) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sscanf.c:13:10: [4] (buffer) vsscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. rv = vsscanf(str, format, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strcat.c:7:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). char *strcat(char *dst, const char *src) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strcat.c:9:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(strchr(dst, '\0'), src); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strcpy.c:9:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). char *strcpy(char *dst, const char *src) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/libansi.c:58:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buffer,CSI "%dD",count); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/libansi.c:66:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buffer, CSI "%dC", count); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/libansi.c:91:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buffer, CSI "%dG", count); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/common.h:40:33: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define DBG_PRINT(fmt, args...) fprintf(stderr, "[ELF] " fmt, ##args) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/debug.h:18:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. len = vsnprintf(buf, sizeof buf, str, va); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/i915resolution.c:196:5: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof msg, fmt, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vasprintf.c:17:13: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. bytes = vsnprintf(NULL, 0, format, ap1) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vasprintf.c:24:12: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. return vsnprintf(p, bytes, format, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vdprintf.c:52:10: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. rv = vsnprintf(buffer, BUFFER_SIZE, format, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vfprintf.c:12:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int vfprintf(FILE * file, const char *format, va_list ap) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vfprintf.c:17:10: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. rv = vsnprintf(buffer, BUFFER_SIZE, format, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vprintf.c:8:5: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int vprintf(const char *format, va_list ap) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vprintf.c:10:12: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return vfprintf(stdout, format, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vsnprintf.c:168:5: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. int vsnprintf(char *buffer, size_t n, const char *format, va_list ap) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vsprintf.c:8:5: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. int vsprintf(char *buffer, const char *format, va_list ap) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vsprintf.c:10:12: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. return vsnprintf(buffer, ~(size_t) 0, format, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vsscanf.c:49:5: [4] (buffer) vsscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int vsscanf(const char *buffer, const char *format, va_list ap) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/zutil.h:242:39: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Trace(x) {if (z_verbose>=0) fprintf x ;} data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/zutil.h:243:39: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracev(x) {if (z_verbose>0) fprintf x ;} data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/zutil.h:244:40: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracevv(x) {if (z_verbose>1) fprintf x ;} data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/zutil.h:245:48: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracec(c,x) {if (z_verbose>0 && (c)) fprintf x ;} data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/zutil.h:246:49: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracecv(c,x) {if (z_verbose>1 && (c)) fprintf x ;} data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dmi.c:125:32: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. s_system *system = &dmi_ptr->system; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dmi.c:131:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. LUA_ADD_STR_P(L, system, manufacturer) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dmi.c:132:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. LUA_ADD_STR_P(L, system, product_name) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dmi.c:133:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. LUA_ADD_STR_P(L, system, version) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dmi.c:134:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. LUA_ADD_STR_P(L, system, serial) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dmi.c:135:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. LUA_ADD_STR_P(L, system, uuid) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dmi.c:136:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. LUA_ADD_STR_P(L, system, wakeup_type) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dmi.c:137:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. LUA_ADD_STR_P(L, system, sku_number) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dmi.c:138:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. LUA_ADD_STR_P(L, system, family) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dmi.c:139:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. LUA_ADD_STR_P(L, system, system_boot_status) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dmi.c:140:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. LUA_ADD_STR_P(L, system, configuration_options) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dmi.c:492:26: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. LUA_ADD_TABLE(L, &dmi, system) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/liolib.c:58:50: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #define lua_popen(L,c,m) ((void)L, fflush(NULL), popen(c,m)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/liolib.c:355:7: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (fscanf(f, LUA_NUMBER_SCAN, &d) == 1) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/liolib.c:535:11: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(f, LUA_NUMBER_FMT, lua_tonumber(L, arg)) > 0; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loslib.c:85:14: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. int stat = system(cmd); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:886:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(form + l - 1, lenmod); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:914:16: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. nb = sprintf(buff, form, luaL_checkint(L, arg)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:924:16: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. nb = sprintf(buff, form, ni); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:934:16: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. nb = sprintf(buff, form, ni); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:943:16: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. nb = sprintf(buff, form, (LUA_FLTFRM_T)luaL_checknumber(L, arg)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:960:18: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. nb = sprintf(buff, form, s); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/luac.c:260:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(bvalue(o) ? "true" : "false"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/luac.c:263:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(LUA_NUMBER_FMT,nvalue(o)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/luaconf.h:227:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. (fprintf(stderr, (s), (p)), fflush(stderr)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/luaconf.h:430:29: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. #define lua_number2str(s,n) sprintf((s), LUA_NUMBER_FMT, (n)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/syslinux.c:157:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(newcmdline + strlen(newcmdline), kernel); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:376:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. ipp += sprintf(ipp, " initrd=%s", ld->initrd); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/refstr.c:73:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. len = vsnprintf(NULL, 0, fmt, ap1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/refstr.c:80:12: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. return vsnprintf(p, len + 1, fmt, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/dmitest.c:102:44: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. moreprintf("\tManufacturer %s\n", dmi->system.manufacturer); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/dmitest.c:103:44: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. moreprintf("\tProduct Name %s\n", dmi->system.product_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/dmitest.c:104:44: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. moreprintf("\tVersion %s\n", dmi->system.version); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/dmitest.c:105:44: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. moreprintf("\tSerial %s\n", dmi->system.serial); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/dmitest.c:106:44: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. moreprintf("\tUUID %s\n", dmi->system.uuid); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/dmitest.c:107:44: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. moreprintf("\tWakeup Type %s\n", dmi->system.wakeup_type); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/dmitest.c:108:44: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. moreprintf("\tSKU Number %s\n", dmi->system.sku_number); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/dmitest.c:109:44: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. moreprintf("\tFamily %s\n", dmi->system.family); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/hexdump.c:168:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, usage, prog_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ifmemdsk.c:146:9: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, usage_text); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/linux.c:296:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(boot_image + 11, kernel_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pcitest.c:54:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf ( __VA_ARGS__); \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/prdhcp.c:48:21: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define dprintf printf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c:63:23: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define dprintf printf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c:1073:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char *)pxep->FileName, ifn); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/whichsys.c:72:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, usage); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/zzjson.c:16:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(ehandle, format, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/zzjson.c:39:62: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. (int(*)(void*,const char*,...)) fprintf, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:273:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(rosh_help_str_adv, cmdstr); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:412:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filestr, pwdstr); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:417:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filestr + filepos, ifilstr); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:566:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filestr2 + file2pos + 1, de->d_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:600:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filestr2 + file2pos + 1, de->d_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:850:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(de.d_name, filestr); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:880:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(optstr, filestr + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:1133:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(APP_NAME ":run: No arguments\n"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.h:49:21: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define ROSH_DEBUG printf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.h:53:23: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define ROSH_DEBUG2 printf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.h:75:28: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define ROSH_COM32(f, ...) printf (f, ## __VA_ARGS__) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/elflink/common.h:32:33: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define DBG_PRINT(fmt, args...) fprintf(stderr, "[ELF] " fmt, ##args) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fs.c:288:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(new_path + copied + 1, next_inode_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/getcwd.c:9:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, this_fs->cwd_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/iso9660/susp_rr.c:50:17: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define dprintf printf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/dhcp_option.c:254:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(boot_file, dhcp->bootfile); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:304:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(urlsave, fullpath); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:310:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(urlsave, fullpath); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:465:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(config_file, sysappend_strings[SYSAPPEND_SYSUUID]+8); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:471:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(config_file, sysappend_strings[SYSAPPEND_BOOTIF]+7); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:487:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(config_file, default_str); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/memp.c:228:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errstr, digit); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/memp.c:231:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errstr, digit); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/memp.c:233:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errstr, memp_overflow_names[memp_type]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/memp.c:261:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errstr, digit); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/memp.c:264:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errstr, digit); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/memp.c:266:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errstr, memp_overflow_names[memp_type]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/snmp/msg_in.c:163:33: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. (msg_ps->ext_object_def.access & MIB_ACCESS_READ)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/snmp/msg_in.c:284:25: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. (object_def.access & MIB_ACCESS_READ)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/snmp/msg_in.c:559:32: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (msg_ps->ext_object_def.access & MIB_ACCESS_WRITE) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/snmp/msg_in.c:674:28: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (object_def.access & MIB_ACCESS_WRITE) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/arch/cc.h:30:32: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define LWIP_PLATFORM_PRINTF printf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/snmp_structs.h:77:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. u8_t access; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:198:14: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. extern char *crypt (const char *, const char *); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:793:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ppp_settings.our_name, ppp_settings.hostname); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:797:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ppp_settings.user, ppp_settings.our_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp_oe.c:371:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(devname, sizeof(devname), "%c%c%"U16_F, sc->sc_ethif->name[0], sc->sc_ethif->name[1], sc->sc_ethif->num); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/printf.c:112:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. int sprintf(char *buf, const char *fmt, ...); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/printf.c:114:5: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. int vsprintf(char *buf, const char *fmt, va_list args) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/printf.c:284:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. int sprintf(char *buf, const char *fmt, ...) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/printf.c:290:9: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. i = vsprintf(buf, fmt, args); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/printf.c:295:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int printf(const char *fmt, ...) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/printf.c:302:15: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. printed = vsprintf(printf_buf, fmt, args); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/stdio.h:11:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. int sprintf(char *buf, const char *fmt, ...); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/stdio.h:12:5: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. int vsprintf(char *buf, const char *fmt, va_list args); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/stdio.h:13:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int printf(const char *fmt, ...); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/stdio.h:21:9: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define fprintf(x, y, ...) printf(y, ## __VA_ARGS__) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/stdio.h:21:28: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define fprintf(x, y, ...) printf(y, ## __VA_ARGS__) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/string.h:14:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). #define strcpy(a,b) __builtin_strcpy(a,b) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/syslinux.c:40:18: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define dprintf printf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:67:18: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define dprintf printf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxcom.c:44:18: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define dprintf printf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:176:6: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(_PATH_MOUNT, _PATH_MOUNT, "-t", fstype, "-o", mnt_opts, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:213:2: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(_PATH_UMOUNT, _PATH_UMOUNT, mntpath, NULL); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:394:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ldlinux_path, "%s%s", mntpath, subdir); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:402:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ldlinux_name, "%sldlinux.sys", ldlinux_path); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:466:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ldlinux_name, "%sldlinux.c32", ldlinux_path); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/prepcore.c:147:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:432:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:432:20: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:433:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:442:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # ifndef snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:443:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:443:20: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:445:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # ifndef vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:446:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:452:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # ifndef snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:453:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:453:20: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:455:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # ifndef vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:456:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:468:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # ifndef snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:469:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:469:22: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:471:13: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # ifndef vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:472:13: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:475:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # ifndef snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:476:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:476:22: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:491:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:491:22: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:492:13: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:525:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:525:20: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:526:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:538:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:538:22: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:539:13: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:568:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:568:22: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:569:13: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2281:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2281:20: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2282:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2293:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2293:20: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2294:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2305:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2305:22: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2306:13: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2320:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2320:22: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2321:13: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2354:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2354:20: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2355:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2367:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2367:22: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2368:13: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2397:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2397:22: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:2398:13: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/conio.c:177:5: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. int vsprintf(char *buf, const char *fmt, va_list args) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/conio.c:348:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. int sprintf(char *buf, const char *fmt, ...) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/conio.c:354:9: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. i = vsprintf(buf, fmt, args); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/conio.c:360:5: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int vprintf(const char *fmt, va_list args) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/conio.c:365:15: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. printed = vsprintf(printf_buf, fmt, args); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/conio.c:370:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int printf(const char *fmt, ...) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/conio.c:376:15: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printed = vprintf(fmt, args); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/conio.c:389:5: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/conio.h:28:5: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int vprintf(const char *, va_list ap); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/conio.h:29:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int printf(const char *, ...); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/dskprobe.c:32:52: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static f_printf *dskprobe_printfs[] = { no_printf, printf }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/memdisk.h:87:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). #define strcpy(a,b) __builtin_strcpy(a,b) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/unzip.c:55:20: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Trace(x) fprintf x data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/unzip.c:56:35: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracev(x) {if (verbose) fprintf x ;} data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/unzip.c:57:38: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracevv(x) {if (verbose>1) fprintf x ;} data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/unzip.c:58:44: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracec(c,x) {if (verbose && (c)) fprintf x ;} data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/unzip.c:59:47: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracecv(c,x) {if (verbose>1 && (c)) fprintf x ;} data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:106:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(cp, "%s'", filename); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:109:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(command, "mattrib -h -r -s %s 2>/dev/null", target_file); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:110:14: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. status = system(command); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:113:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(command, "mmove -D o -D O s:/%s %s", filename, target_file); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:114:14: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. status = system(command); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:120:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(command, "mattrib +r +h +s s:/%s", filename); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:121:11: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. status = system(command); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:123:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(command, "mattrib +r +h +s %s", target_file); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:124:11: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. status = system(command); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:218:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(mtc, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:245:14: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. status = system("mattrib -h -r -s s:/ldlinux.sys 2>/dev/null"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:248:11: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. mtp = popen("mcopy -D o -D O -o - s:/ldlinux.sys", "w"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:294:11: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. status = system("mattrib +r +h +s s:/ldlinux.sys"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:304:14: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. status = system("mattrib -h -r -s s:/ldlinux.c32 2>/dev/null"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:307:11: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. mtp = popen("mcopy -D o -D O -o - s:/ldlinux.c32", "w"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:319:11: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. status = system("mattrib +r +h +s s:/ldlinux.c32"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:234:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(FMT, " -h <X>", "Number of geometry heads (default 64)"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:235:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(FMT, " -s <X>", "Number of geometry sectors (default 32)"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:236:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(FMT, " -e --entry", "Specify partition entry number (1-4)"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:237:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(FMT, " -o --offset", "Specify partition offset (default 0)"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:238:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(FMT, " -t --type", "Specify partition type (default 0x17)"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:239:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(FMT, " -i --id", "Specify MBR ID (default random)"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:240:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(FMT, " -u --uefi", "Build EFI bootable image"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:241:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(FMT, " -m --mac", "Add AFP table support"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:242:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(FMT, " -b --mbr <PATH>", "Load MBR from PATH"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:245:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(FMT, " --forcehd0", "Assume we are loaded as disk ID 0"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:246:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(FMT, " --ctrlhd0", "Assume disk ID 0 if the Ctrl key is pressed"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:247:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(FMT, " --partok", "Allow booting from within a partition"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:250:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(FMT, " -? --help", "Display this help"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:251:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(FMT, " -v --verbose", "Display verbose output"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:252:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(FMT, " -V --version", "Display version information"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:357:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mbr_template_path, optarg); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:954:12: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). prog = strcpy(alloca(strlen(argv[0]) + 1), argv[0]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/win/ntfssect.c:104:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(volname + sizeof M_VOL_PREFIX - 1, VolumeName); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/win/ntfstest.c:137:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(usage_text); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/execute.c:152:3: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(config, kernel, FILENAME_MAX); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/getopt.h:19:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. __extern int getopt_long(int, char *const *, const char *, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdlib.h:48:25: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. static __inline__ char *getenv(const char *name) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdlib.h:61:15: [3] (random) jrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. __extern long jrand48(unsigned short *); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdlib.h:62:15: [3] (random) mrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. __extern long mrand48(void); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdlib.h:63:15: [3] (random) nrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. __extern long nrand48(unsigned short *); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdlib.h:64:15: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. __extern long lrand48(void); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdlib.h:65:26: [3] (random) seed48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. __extern unsigned short *seed48(const unsigned short *); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdlib.h:71:17: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return (int)lrand48(); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdlib.h:74:24: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. static __inline__ void srand(unsigned int __s) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdlib.h:79:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. static __inline__ long random(void) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdlib.h:81:12: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return lrand48(); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdlib.h:84:24: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. static __inline__ void srandom(unsigned int __s) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/unistd.h:31:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. __extern int getopt(int, char *const *, const char *); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/getopt.c:19:5: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. int getopt(int argc, char *const *argv, const char *optstring) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/getopt_long.c:38:5: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. int getopt_long(int argc, char *const *argv, const char *optstring, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/example.c:436:26: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if ((gamma_str = getenv("SCREEN_GAMMA")) != NULL) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/lrand48.c:10:6: [3] (random) jrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. long jrand48(unsigned short xsubi[3]) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/lrand48.c:27:6: [3] (random) mrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. long mrand48(void) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/lrand48.c:29:12: [3] (random) jrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return jrand48(__rand48_seed); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/lrand48.c:32:6: [3] (random) nrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. long nrand48(unsigned short xsubi[3]) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/lrand48.c:34:30: [3] (random) jrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return (long)((uint32_t) jrand48(xsubi) >> 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/lrand48.c:37:6: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. long lrand48(void) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/lrand48.c:39:30: [3] (random) mrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return (long)((uint32_t) mrand48() >> 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/seed48.c:11:17: [3] (random) seed48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. unsigned short *seed48(const unsigned short xsubi[3]) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lmathlib.c:227:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(luaL_checkunsigned(L, 1)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loadlib.c:715:22: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *path = getenv(envname1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loadlib.c:717:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. path = getenv(envname2); /* try alternative name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loslib.c:60:33: [3] (tmpfile) tmpnam: Temporary file race condition (CWE-377). #define lua_tmpnam(b,e) { e = (tmpnam(b) == NULL); } data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loslib.c:121:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. lua_pushstring(L, getenv(luaL_checkstring(L, 1))); /* if NULL push nil */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lua.c:432:22: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *init = getenv(name + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lua.c:435:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. init = getenv(name + 1); /* try alternative name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c:763:32: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((rv >= 0) && (arg = getopt(argc, argv, optstr)) >= 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:522:7: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. rv = getopt(argc, argv, rosh_ls_opt_str); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.h:157:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. str = getenv("LINES"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.h:162:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. str = getenv("COLUMNS"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/chdir.c:18:5: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(dst, src, FILENAME_MAX); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/chdir.c:58:17: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. __export size_t realpath(char *dst, const char *src, size_t bufsize) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/chdir.c:66:26: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (this_fs->fs_ops->realpath) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/chdir.c:67:23: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. s = this_fs->fs_ops->realpath(this_fs, dst, src, bufsize); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/lib/searchconfig.c:31:10: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (realpath(realname, namebuf, FILENAME_MAX) == (size_t)-1) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/fs.h:61:16: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. size_t (*realpath)(struct fs_info *, char *, const char *, size_t); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/fs.h:218:8: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. size_t realpath(char *dst, const char *src, size_t bufsize); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/randm.c:206:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned)avRandomSeed); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:244:15: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. dirpath = realpath(dir, NULL); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/mountinfo.c:211:17: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. real_path = realpath(path, NULL); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/getopt/getopt.h:22:12: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. extern int getopt_long(int, char *const *, const char *, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/getopt/getopt_long.c:38:5: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. int getopt_long(int argc, char *const *argv, const char *optstring, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxopt.c:140:17: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((o = getopt_long(argc, argv, short_options, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:3317:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. return getenv(s); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:6197:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. return getenv(s); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:170:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. tmpdir = getenv("TMPDIR"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/gethostip.c:59:19: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt = getopt_long(argc, argv, "dxfnh", options, NULL)) != -1) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:968:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL) << (getppid() << getpid())); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/chain.c:221:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(swapstub, swapstub_master, sizeof swapstub_master); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/chain.c:435:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(plen + 1, iter->record, plen[0]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/chain.c:449:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ha, iter->record, synth_size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/chain.c:545:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sbck, sdat.data, sdat.size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/chain.c:605:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + ndata++, &fdat, sizeof fdat); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/chain.c:607:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + ndata++, &sdat, sizeof sdat); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/chain.c:609:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + ndata++, &hdat, sizeof hdat); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/mangle.c:44:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char cmldr_signature[8] = "cmdcons"; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/mangle.c:113:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&xword, chkhead, data->size & 3); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/mangle.c:129:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char unknown[0x206]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/mangle.c:154:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version_string[5]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/mangle.c:156:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char config_file[89]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/mangle.c:158:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char codestart[1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/mangle.c:367:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)fil->data + 0x0B, (char *)sec->data + 0x0B, 0x0D); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/mangle.c:385:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)fil->data + 0x18, (char *)sec->data + 0x18, cnt); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/mangle.c:406:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(org, data->data, data->size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/mangle.c:424:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)data->data + 3, cmldr_signature, sizeof cmldr_signature); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/mangle.c:490:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(diter->data, siter->data, sizeof(struct disk_dos_mbr)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/partiter.c:87:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&iter->di, di, sizeof *di); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/partiter.c:110:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iter->data, mbr, sizeof *mbr); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/partiter.c:140:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iter->data, gptl, (size_t)siz); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/partiter.c:147:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&iter->gpt.disk_guid, &gpth->disk_guid, sizeof gpth->disk_guid); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/partiter.c:148:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&iter->gpt.part_guid, &gpth->disk_guid, sizeof gpth->disk_guid); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/partiter.c:514:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&iter->gpt.part_guid, &gpt_part->uid, sizeof(struct guid)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/partiter.c:591:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errbuf[96]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/partiter.c:618:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errbuf[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/partiter.h:90:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char part_label[PI_GPTLABSIZE/2+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:28:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infoline[160]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:29:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:53:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char username[12]; // Name of user currently using the system data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:98:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pwd[40]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:99:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char login[40]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:174:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(infoline, "baseurl=http://192.168.11.12/gui "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:176:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(infoline, "mountcd=yes "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:180:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(infoline, "network="); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:184:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(infoline, "repair=win "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:186:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(infoline, "repair=lin "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:254:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[160]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:255:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[30]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:424:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ip, "Junk"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:426:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(cmd, "ipaddr=192.168."); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/des.c:915:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *p, packed_keys[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/des.c:954:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char output[21]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/help.c:20:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char helpbasedir[HELPDIRLEN]; // name of help directory limited to HELPDIRLEN data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/help.c:98:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[512]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/help.c:115:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(line, "Filename not given"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/help.c:200:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullname[HELPDIRLEN + 16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/help.c:215:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[15]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/help.c:217:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(filename, "hlp%05d.txt", helpid); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:175:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fchar[6], lchar[6]; // The first and last char in for each entry data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:177:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sep[MENULEN]; // Separator (OPT_SEP) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.c:28:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char salt[12]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.c:84:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_LINE], *p, *user, *pwdhash, *perms; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.c:94:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.h:18:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char username[USERNAME_LENGTH + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.h:19:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pwdhash[PWDHASH_LENGTH + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/cli.c:65:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_CMDLINE_LEN]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/cli.c:128:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cmdline[MAX_CMDLINE_LEN] = { }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/colors.c:130:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char msg_names[6 * 256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/colors.c:148:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. mp += sprintf(mp, "msg%02x", i) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/get_key.c:196:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[KEY_MAXLEN]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c:122:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(k, kernel, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c:126:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(k + len, ext, elen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/msg.c:29:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/msg.c:134:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(VGAFileMBuf, "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:122:34: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if ( __p ) memcpy(__p, __x, __n); \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:211:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m->mparm, parent->mparm, sizeof m->mparm); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:360:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipoptions[4096], *ipp; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:826:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(file, O_RDONLY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:863:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(file, O_RDONLY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:878:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_LINE], *p, *ep, ch; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1068:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ld.menuindent = atoi(skipspace(p + 6)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1104:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). m->mparm[mp] = atoi(skipspace(ep)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1138:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ld.helptext + len, line, xlen + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1204:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). kbdtimeout = (atoi(skipspace(p + 7)) * CLK_TCK + 9) / 10; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1211:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). allowoptions = !!atoi(skipspace(p + 12)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1284:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). allowimplicit = atoi(skipspace(p + 8)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1286:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). forceprompt = atoi(skipspace(p + 6)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1288:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). DisplayCon = atoi(skipspace(p + 7)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1290:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). allowoptions = atoi(skipspace(p + 12)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1292:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). noescape = atoi(skipspace(p + 8)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1294:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nocomplete = atoi(skipspace(p + 10)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1296:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). NoHalt = atoi(skipspace(p + 8)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1306:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). PXERetry = atoi(skipspace(p + 8)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1329:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). baud = atoi(p); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1445:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, O_RDONLY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1552:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lstr, lbl, len); /* refstr_alloc() adds the final null */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/refstr.c:48:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(r, str, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/refstr.c:63:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(r, str, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/setadv.c:65:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, syslinux_adv_ptr(), left); /* Make working copy */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/setadv.c:105:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, data, size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/setadv.c:113:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(syslinux_adv_ptr(), advtmp, syslinux_adv_size()); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/test_com32.c:183:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[MAX_COMMAND_SIZE] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gdbstub/gdbstub.c:83:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SIZEOF_PAYLOAD + 4]; /* $...PAYLOAD...#XX */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gdbstub/gdbstub.c:406:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. gdbstub_to_hex_buf(stub->payload, (char *)args[0], args[1]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gdbstub/gdbstub.c:421:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. gdbstub_from_hex_buf((char *)args[0], &stub->payload[colon + 1], data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gdbstub/main.c:72:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(COM32_LOAD_ADDR, ri->data, ri->len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gdbstub/main.c:76:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)module_esp, (void *)ri->old_esp, stack_frame_size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gdbstub/main.c:111:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, _start, total_size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:147:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname_buf[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:154:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdline[MAX_CMDLINE_LEN]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:186:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char working_dir[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:268:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if(!(f = fopen(file, "r"))) return; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:315:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *s, *t, buf[MAX_CONFIG_LINE_LEN]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:329:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if(!(f = fopen(filename, "r"))) return 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:348:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). timeout = atoi(t); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:581:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lowmem + REALMODE_BUF_SIZE, realmode_callback_start, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:594:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lowmem, archive + file_start + code_start, code_size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:766:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fd = open(file, O_RDONLY)) == -1) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:859:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(menu_ptr->ipappend && (ipapp = atoi(menu_ptr->ipappend))) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:912:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fd = open(file, O_RDONLY)) >= 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/acpi/acpi.h:70:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define cp_struct(dest) memcpy(dest,q,sizeof(*dest)); q+=sizeof(*dest) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/cpuid.h:140:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vendor[CPU_VENDOR_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/cpuid.h:143:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[CPU_MODEL_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/cpuid.h:238:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char x86_vendor_id[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/cpuid.h:239:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char x86_model_id[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/cpuid.h:263:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *model_names[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/cpuid.h:271:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *c_ident[2]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/cpuid.h:293:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mpf_signature[4]; /* "_MP_" */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/disk/swsusp.h:11:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reserved[PAGE_SIZE - 20 - sizeof(unsigned long) - sizeof(int)]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/disk/swsusp.h:14:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char orig_sig[10]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/disk/swsusp.h:15:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sig[10]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi.h:43:72: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. #define moreprintf(...) do { display_line++; if (display_line == 24) { char tempbuf[10]; display_line=0; printf("Press enter to continue"); fgets(tempbuf, sizeof tempbuf, stdin);} printf ( __VA_ARGS__); } while (0); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi.h:76:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oem_strings[OEM_STRINGS_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi.h:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char power_on_passwd_status[HARDWARE_SECURITY_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi.h:79:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyboard_passwd_status[HARDWARE_SECURITY_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi.h:80:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char administrator_passwd_status[HARDWARE_SECURITY_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi.h:81:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char front_panel_reset_status[HARDWARE_SECURITY_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_base_board.h:43:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char manufacturer[BASE_BOARD_MANUFACTURER_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_base_board.h:44:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char product_name[BASE_BOARD_PRODUCT_NAME_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_base_board.h:45:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[BASE_BOARD_VERSION_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_base_board.h:46:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serial[BASE_BOARD_SERIAL_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_base_board.h:47:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char asset_tag[BASE_BOARD_ASSET_TAG_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_base_board.h:48:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char location[BASE_BOARD_LOCATION_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_base_board.h:49:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[BASE_BOARD_TYPE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_base_board.h:54:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_base_board.h:56:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char description[BASE_BOARD_DEVICE_DESCRIPTION]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_battery.h:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char location[BATTERY_LOCATION_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_battery.h:36:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char manufacturer[BATTERY_MANUFACTURER_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_battery.h:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char manufacture_date[BATTERY_MANUFACTURE_DATE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_battery.h:38:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serial[BATTERY_SERIAL_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_battery.h:39:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[BATTERY_DEVICE_NAME_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_battery.h:40:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chemistry[BATTERY_CHEMISTRY_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_battery.h:41:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char design_capacity[BATTERY_CAPACITY_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_battery.h:42:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char design_voltage[BATTERY_DESIGN_VOLTAGE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_battery.h:43:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbds[BATTERY_SBDS_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_battery.h:44:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbds_serial[BATTERY_SBDS_SERIAL_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_battery.h:45:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char maximum_error[BATTERY_MAXIMUM_ERROR_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_battery.h:46:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbds_manufacture_date[BATTERY_SBDS_MANUFACTURE_DATE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_battery.h:47:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbds_chemistry[BATTERY_SBDS_CHEMISTRY_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_battery.h:48:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oem_info[BATTERY_OEM_INFO_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_bios.h:91:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vendor[BIOS_VENDOR_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_bios.h:92:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[BIOS_VERSION_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_bios.h:93:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char release_date[BIOS_RELEASE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_bios.h:96:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char runtime_size_unit[BIOS_RUNTIME_SIZE_UNIT_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_bios.h:98:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rom_size_unit[BIOS_ROM_UNIT_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_bios.h:102:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bios_revision[BIOS_BIOS_REVISION_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_bios.h:103:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char firmware_revision[BIOS_FIRMWARE_REVISION_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_cache.h:28:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char socket_designation[CACHE_SOCKET_DESIGNATION_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_cache.h:29:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char configuration[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_cache.h:30:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mode[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_cache.h:31:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char location[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_cache.h:34:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char supported_sram_types[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_cache.h:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char installed_sram_types[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_cache.h:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_correction_type[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_cache.h:38:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char system_type[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_cache.h:39:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char associativity[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_chassis.h:29:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char manufacturer[CHASSIS_MANUFACTURER_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_chassis.h:30:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[CHASSIS_TYPE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_chassis.h:31:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lock[CHASSIS_LOCK_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_chassis.h:32:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[CHASSIS_VERSION_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_chassis.h:33:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serial[CHASSIS_SERIAL_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_chassis.h:34:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char asset_tag[CHASSIS_ASSET_TAG_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_chassis.h:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char boot_up_state[CHASSIS_BOOT_UP_STATE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_chassis.h:36:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char power_supply_state[CHASSIS_POWER_SUPPLY_STATE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_chassis.h:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char thermal_state[CHASSIS_THERMAL_STATE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_chassis.h:38:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char security_status[CHASSIS_SECURITY_STATUS_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_chassis.h:39:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oem_information[CHASSIS_OEM_INFORMATION_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_ipmi.h:20:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char interface_type[IPMI_INTERFACE_TYPE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:34:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char manufacturer[MEMORY_MANUFACTURER_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[MEMORY_ERROR_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:36:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char total_width[MEMORY_TOTAL_WIDTH_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data_width[MEMORY_DATA_WIDTH_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:38:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char size[MEMORY_SIZE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:39:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char form_factor[MEMORY_FORM_FACTOR_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:40:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char device_set[MEMORY_DEVICE_SET_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:41:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char device_locator[MEMORY_DEVICE_LOCATOR_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:42:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bank_locator[MEMORY_BANK_LOCATOR_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:43:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[MEMORY_TYPE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:44:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type_detail[MEMORY_TYPE_DETAIL_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:45:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char speed[MEMORY_SPEED_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:46:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serial[MEMORY_SERIAL_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:47:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char asset_tag[MEMORY_ASSET_TAG_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:48:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char part_number[MEMORY_PART_NUMBER_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:54:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char socket_designation[MEMORY_SOCKET_DESIGNATION_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bank_connections[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:56:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char speed[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:57:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[48]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:58:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char installed_size[48]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:59:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char enabled_size[48]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_memory.h:60:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_status[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_processor.h:34:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char *cpu_flags_strings[PROCESSOR_FLAGS_ELEMENTS]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_processor.h:82:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char socket_designation[PROCESSOR_SOCKET_DESIGNATION_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_processor.h:83:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[PROCESSOR_TYPE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_processor.h:84:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char family[PROCESSOR_FAMILY_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_processor.h:85:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char manufacturer[PROCESSOR_MANUFACTURER_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_processor.h:86:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[PROCESSOR_VERSION_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_processor.h:91:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char status[PROCESSOR_STATUS_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_processor.h:92:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char upgrade[PROCESSOR_UPGRADE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_processor.h:93:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cache1[PROCESSOR_CACHE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_processor.h:94:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cache2[PROCESSOR_CACHE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_processor.h:95:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cache3[PROCESSOR_CACHE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_processor.h:96:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serial[PROCESSOR_SERIAL_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_processor.h:97:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char asset_tag[PROCESSOR_ASSET_TAG_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_processor.h:98:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char part_number[PROCESSOR_PART_NUMBER_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_processor.h:99:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[PROCESSOR_ID_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h:29:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char manufacturer[SYSTEM_MANUFACTURER_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h:30:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char product_name[SYSTEM_PRODUCT_NAME_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h:31:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[SYSTEM_VERSION_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h:32:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serial[SYSTEM_SERIAL_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h:33:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuid[SYSTEM_UUID_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h:34:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wakeup_type[SYSTEM_WAKEUP_TYPE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sku_number[SYSTEM_SKU_NUMBER_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h:36:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char family[SYSTEM_FAMILY_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h:39:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char system_boot_status[SYSTEM_BOOT_STATUS_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h:40:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char configuration_options[SYSTEM_CONFIGURATION_OPTIONS_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char boot_option[17]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char boot_option_on_limit[17]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reset_count[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reset_limit[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timer_interval[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/dmi/dmi_system.h:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timeout[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/memory.h:40:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const e820_types[5]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/vpd/vpd.h:21:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bios_build_id[10]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/vpd/vpd.h:22:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char box_serial_number[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/vpd/vpd.h:23:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char motherboard_serial_number[12]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/vpd/vpd.h:24:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char machine_type_model[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/vpd/vpd.h:25:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bios_release_date[9]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/vpd/vpd.h:26:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char default_flash_filename[13]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/vpd/vpd.h:27:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bios_version[255]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/vpd/vpd.h:28:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char base_address[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:38:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buffer, "default"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:40:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buffer, "high"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:42:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buffer, "low"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:117:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&f->header, &adh, sizeof(adh)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:142:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d->header, &new_adh, sizeof(new_adh)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:153:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d->header, &new_adh, sizeof(new_adh)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:165:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m->header, &adh, sizeof(adh)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:173:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d->header, &adh, sizeof(adh)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:193:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&s->header, &adh, sizeof(adh)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:199:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s->definition_block, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:211:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&s->header, &adh, sizeof(adh)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:219:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&e->header, &adh, sizeof(adh)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:227:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&h->header, &adh, sizeof(adh)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:234:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&t->header, &adh, sizeof(adh)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:241:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&m->header, &adh, sizeof(adh)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:248:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&s->header, &adh, sizeof(adh)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:255:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&b->header, &adh, sizeof(adh)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/dsdt.c:45:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d->definition_block,q,definition_block_size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/ecdt.c:51:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(e->ec_id, (uint64_t *) (e->address + EC_ID_OFFSET), ec_id_size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/fadt.c:41:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(f->header.signature,FADT,sizeof(FADT)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/madt.c:136:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sls->acpi_processor_uid_string, q, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/madt.c:157:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m->header.signature, APIC, sizeof(APIC)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/rsdt.c:61:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char address[16] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/rsdt.c:62:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(address, "%x", *p); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/xsdt.c:65:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char address[16] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/xsdt.c:66:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(address, "%" PRIx64 "x", *p); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/bootloaders.c:28:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char boot_sector[SECTOR * sizeof(char)]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/geom.c:156:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&drive_info->edd_params, dp, sizeof drive_info->edd_params); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/mbrs.c:132:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mbr[SECTOR * sizeof(char)]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/read.c:141:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bufp, buf, sectors * SECTOR); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/disk/write.c:51:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, data, SECTOR * size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:252:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dmi->system.uuid, "Not Present"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:256:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dmi->system.uuid, "Not Settable"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:260:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dmi->system.uuid, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:365:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dmi->processor.id, "ID: %02X %02X %02X %02X %02X %02X %02X %02X\n", data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:754:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dmi->processor.status, "Unpopulated"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:925:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dmi->battery.sbds_serial, "%04X", WORD(data + 0x10)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:927:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dmi->battery.sbds_manufacture_date, "%u-%02u-%02u", data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:1012:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, (int *)dmi->dmitable.base, sizeof(uint8_t) * dmi->dmitable.len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_battery.c:55:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(capacity, "%u mWh", code * multiplier); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_battery.c:63:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(voltage, "%u mV", code); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_battery.c:71:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(error, "%u%%", code); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_cache.c:40:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *location[4] = { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_cache.c:74:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(array, "None"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:39:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(array, "0x%04X", code); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:51:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(width, "%u bits", code); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:62:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(size, "%u kB", code & 0x7FFF); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:64:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(size, "%u MB", code); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:101:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(set, "%u", code); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:182:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(speed, "%u MHz", code); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:223:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(connection, "%u ", code >> 4); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:234:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(speed, "%u ns", code); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_memory.c:251:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(size, "%u MB", 1 << (code & 0x7F)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_processor.c:53:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *family[256] = { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_processor.c:413:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cache, "Not Provided"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_processor.c:417:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cache, "0x%04X", code); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi_processor.c:421:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *cpu_flags_strings[PROCESSOR_FLAGS_ELEMENTS] = { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/memory.c:113:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bounce, &buf, sizeof buf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/memory.c:134:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf, bounce, sizeof buf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/memory.c:144:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&desc[count], &buf, sizeof buf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/vpd/vpd.c:65:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, q, 5); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/zzjson/zzjson_create.c:59:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(scopy, s, slen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/zzjson/zzjson_parse.c:240:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[strlen(s)+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-ata.h:38:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char serial_no[20]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-ata.h:40:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char fw_rev[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-ata.h:41:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char model[40]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-ata.h:56:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host_bus_type[5]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-ata.h:57:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char interface_type[9]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-acpi.c:149:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-acpi.c:151:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buffer, "disable"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-acpi.c:155:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buffer, "enable"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-acpi.c:171:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[20]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-acpi.c:190:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[15]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-acpi.c:196:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buffer, "GSI 0-23"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-acpi.c:199:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buffer, "GSI 24-39"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-acpi.c:202:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buffer, "GSI 40-55"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-acpi.c:205:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buffer, "GSI Unknown"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-acpi.c:225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[20]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-acpi.c:226:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bus_type[10]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-acpi.c:230:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(bus_type, "ISA"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-acpi.c:232:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(bus_type, "unknown"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-cpu.c:40:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char features[81]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-cpu.c:62:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(features, "x86_64 64bit "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-cpu.c:64:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(features, "x86 32bit "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-cpu.c:66:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(features, "SMP "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-cpu.c:70:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(features, "HwVIRT "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-cpu.c:79:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char output_buffer[81]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-cpu.c:101:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[81]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-disk.c:58:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char size[11]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-disk.c:59:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bootloader_name[9]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-disk.c:111:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char disk_size[11]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-disk.c:112:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mbr_name[50]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-disk.c:173:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[5] = ""; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-disk.c:174:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "0x%x", drive); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-disk.c:175:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[1] = { buf }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-disk.c:199:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char disk_size[11]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:40:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char available_dmi_commands[1024]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:547:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bank_number[255]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-hdt.c:188:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version_string[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-hdt.c:236:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *contributors[NB_CONTRIBUTORS] = CONTRIBUTORS; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-hdt.c:270:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). more_printf("Sleep %d milliseconds\n",atoi(argv[0])); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-hdt.c:271:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). msleep(atoi(argv[0])); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-hdt.c:295:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text_to_say[255]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-hdt.c:307:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. argument = (char *)argv[arg]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c:40:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024] = {0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c:43:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kernel_modules[LINUX_KERNEL_MODULE_SIZE * data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c:93:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kernel_modules[LINUX_KERNEL_MODULE_SIZE * data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c:95:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modules[MAX_PCI_CLASSES][256] = {{0}}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c:96:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char category_name[MAX_PCI_CLASSES][256] = {{0}}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-memory.c:40:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[14]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-pci.c:53:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kernel_modules[LINUX_KERNEL_MODULE_SIZE * data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-pci.c:152:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kernel_modules[LINUX_KERNEL_MODULE_SIZE * data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-pci.c:158:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char first_line[81]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-pci.c:159:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char second_line[81]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-pxe.c:43:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[81]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:79:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char autocomplete_token[MAX_LINE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:540:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char autocomplete_full_line[MAX_LINE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:761:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *commands[MAX_NB_AUTO_COMMANDS]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:825:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_command[MAX_LINE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1112:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[2]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1116:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(key, "%c", current_key); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.h:95:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prompt[PROMPT_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.h:97:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char history[MAX_HISTORY_SIZE+1][MAX_LINE_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:138:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. argument = (char *)argv[i]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:160:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. argument = (char *)argv[i]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:240:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(hardware->dump_path, "hdt"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:241:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(hardware->dump_filename, "%{m}+%{p}+%{v}"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:242:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(hardware->pciids_path, "pci.ids"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:243:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(hardware->modules_pcimap_path, "modules.pcimap"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:244:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(hardware->modules_alias_path, "modules.alias"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:245:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(hardware->memtest_label, "memtest"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:377:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&hardware->vesa.vmi[hardware->vesa.vmi_count].mi, mi, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h:155:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mac_addr[18]; /* The current mac address */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h:173:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vendor[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h:174:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char product[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h:175:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char product_revision[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h:213:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char syslinux_fs[22]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h:215:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modules_pcimap_path[255]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h:216:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modules_alias_path[255]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h:217:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pciids_path[255]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h:218:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dump_path[255]; /* Dump path on the tftp server */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h:219:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dump_filename[255]; /* Dump filename on the tftp server */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h:220:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tftp_ip[255]; /* IP address of tftp server (dump mode) */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h:221:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char memtest_label[255]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h:222:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char auto_label[AUTO_COMMAND_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h:223:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vesa_background[255]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.h:224:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char postexec[255]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:34:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char signature[10]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:35:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char revision[10]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_address[16]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oem_id[16]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oem_table_id[16]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oem_revision[16]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char creator_revision[16]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char creator_id[16]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char address_name[32]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:52:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char signature_name[32]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char revision_name[32]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:54:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oem_id_name[32]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:55:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oem_table_id_name[32]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:56:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oem_revision_name[32]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:57:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char creator_revision_name[32]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:58:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char creator_id_name[32]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valid[8]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valid[8]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:125:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valid[8]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:145:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valid[8]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:165:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valid[8]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:185:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valid[8]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:205:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valid[8]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valid[8]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:245:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valid[8]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:265:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valid[8]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:286:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valid[8]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:306:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valid[8]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:326:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valid[8]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:346:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valid[8]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:362:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char revision[10]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:363:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char address[16]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:364:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oem_id[16]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:380:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valid[8]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:396:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char address[16]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:421:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[20] = {0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:422:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bus_type[10]= {0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:426:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(bus_type, "ISA"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:428:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(bus_type, "unknown"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:456:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[15]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:462:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buffer, "0-23"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:465:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buffer,"24-39"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:468:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buffer, "40-55"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:471:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buffer,"Unknown"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:475:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char apic_id[16] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:476:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char address[16] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:503:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[20]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:504:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char acpi_id[16] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:505:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_apic_lint[16] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:520:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[16] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:537:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lapic_status[16] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:538:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char acpi_id[16] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-acpi.c:539:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char apic_id[16] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-cpu.c:47:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[128]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-disks.c:40:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char size[11] = {0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-disks.c:41:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bootloader_name[9] = {0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-disks.c:42:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ostype[64]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-disks.c:45:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bootable[6] = {0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-disks.c:82:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mbr_name[50]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-disks.c:83:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char disk_size[11]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-disks.c:89:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char disk[5]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-disks.c:90:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char edd_version[5]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:81:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[64]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:142:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[64]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:180:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char voltage[16]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:214:42: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. add_s("dmi.processor.flag",(char *)cpu_flags_strings[i]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:253:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spec_ver[16]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:254:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char i2c[16]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:255:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char base[16]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:309:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char address[16]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:310:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char runtime[16]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:311:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rom[16]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:328:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. add_s("dmi.bios.characteristics",(char *)bios_charac_strings[i]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:334:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. add_s("dmi.bios.characteristics",(char *)bios_charac_x1_strings[i]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:340:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. add_s("dmi.bios.characteristics",(char *)bios_charac_x2_strings[i]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:354:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char system_reset_status[10]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:355:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char watchdog_timer[15]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:402:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. add_s("dmi.base_board.features",(char *)base_board_features_strings[i]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:426:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[8]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-hdt.c:42:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *contributors[NB_CONTRIBUTORS] = CONTRIBUTORS; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-memory.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[14] = {0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-memory.c:91:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char begin[24]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-memory.c:92:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char size[24]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-memory.c:93:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char end[24]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-memory.c:108:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char begin[24]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-memory.c:109:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char size[24]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-memory.c:110:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char end[24]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-pci.c:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kernel_modules[LINUX_KERNEL_MODULE_SIZE * data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-pci.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char v[10] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-pci.c:67:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sv[10] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-pci.c:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p[10] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-pci.c:69:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sp[10] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-pci.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[10] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-pci.c:71:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char r[10] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-pxe.c:40:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32] = {0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-pxe.c:74:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&in, hardware->pxe.ip_addr, sizeof in); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-vesa.c:38:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[64]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump.c:101:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char option[8] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump.c:188:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *arg[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-about.c:34:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-about.c:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-about.c:82:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *contributors[NB_CONTRIBUTORS] = CONTRIBUTORS; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-acpi.c:32:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-acpi.c:33:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-acpi.c:53:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-acpi.c:107:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-acpi.c:108:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:41:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char menu_title[MENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:42:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char menu_title_ref[MENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:78:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char size[11]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:79:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bootloader_name[9]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:82:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:83:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:84:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char menu_title[MENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:85:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char menu_title_ref[MENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:156:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:157:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:158:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mbr_name[50]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:167:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char previous_unit[3], unit[3]; // GB data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:168:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char size_iec[11]; // GiB data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:169:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char size_dec[11]; // GB data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:187:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. remove_spaces((char *)d[disk_number].edd_params.host_bus_type), data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:190:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. remove_spaces((char *)d[disk_number].edd_params.host_bus_type), data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-disk.c:238:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:34:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:92:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:93:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:140:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:141:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:181:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:182:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:238:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:239:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:295:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-dmi.c:296:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-kernel.c:34:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-kernel.c:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infobar[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-kernel.c:36:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kernel_modules[LINUX_KERNEL_MODULE_SIZE * data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:36:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:39:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, " e820 information "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:45:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[14]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:73:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:74:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:76:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, " e801 information "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:114:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:115:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:117:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, " 88 information "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:142:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:143:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:145:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, " Bank <%d> ", i); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:253:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:254:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:256:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, " Bank <%d> ", i); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-memory.c:315:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-pci.c:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[56]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-pci.c:38:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-pci.c:39:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kernel_modules[LINUX_KERNEL_MODULE_SIZE * data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-pci.c:150:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char menuname[255][MENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-pci.c:151:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infobar[255][STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-pci.c:153:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kernel_modules[LINUX_KERNEL_MODULE_SIZE * data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-processor.c:34:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char output_buffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-processor.c:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-processor.c:53:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-processor.c:54:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer1[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-processor.c:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-pxe.c:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-pxe.c:36:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infobar[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-pxe.c:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gpxe[4]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:34:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char features[255]={0}; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:57:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, ", %d thread", hardware->dmi.processor.thread_count); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:63:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(features, ", 64bit"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:65:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(features, ", 32bit"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:67:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(features, ", SMP"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:69:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(features, ", HwVIRT"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:161:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kernel_modules[LINUX_KERNEL_MODULE_SIZE * data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-syslinux.c:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char syslinux_fs_menu[24]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-syslinux.c:36:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-syslinux.c:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-vesa.c:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-vesa.c:36:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-vesa.c:86:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[56]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-vesa.c:87:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-vesa.c:112:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[15]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-vpd.c:36:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SUBMENULEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-vpd.c:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statbuffer[STATLEN + 1]; /* Status bar */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu.c:51:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[160]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu.c:183:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char menu_item[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-util.c:44:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "%3d.%02d TiB", tib,sub(gib)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-util.c:46:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "%3d.%02d GiB", gib,sub(mib)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-util.c:48:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "%3d.%02d MiB", mib,sub(b)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-util.c:50:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "%d B", b); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-util.c:89:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "%3d.%02d TB", tib,sub_dec(gib)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-util.c:91:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "%3d.%02d GB", gib,sub_dec(mib)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-util.c:93:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "%3d.%02d MB", mib,sub_dec(b)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-util.c:95:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "%d B", b); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt.c:50:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version_string[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/fcntl.h:23:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). __extern int open(const char *, int, ...); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/gzguts.h:47:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). # define open _open data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/menu.h:151:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *messages[MSG_COUNT]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/menu.h:188:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char *hide_key[KEY_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/png.h:1036:54: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. PNG_EXPORT(241, int, png_convert_to_rfc1123_buffer, (char out[29], data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/png.h:2707:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pngdebug.h:109:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[256]; \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pngdebug.h:120:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[256]; \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pngdebug.h:131:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[256]; \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pngpriv.h:1774:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef char png_warning_parameters[PNG_WARNING_PARAMETER_COUNT][ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/pngstruct.h:366:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_buffer[29]; /* String to hold RFC 1123 time text */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdio.h:49:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). __extern FILE *fopen(const char *, const char *); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdlib.h:23:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). __extern int atoi(const char *); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdlib.h:24:15: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). __extern long atol(const char *); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/string.h:14:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. __extern void *memcpy(void *, const void *, size_t); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/dirent.h:20:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d_name[NAME_MAX + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/elf32.h:62:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char e_ident[EI_NIDENT]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/elf64.h:62:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char e_ident[EI_NIDENT]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/module.h:88:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MODULE_NAME_SIZE]; // The module name data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/pci.h:28:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vendor_name[PCI_VENDOR_NAME_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/pci.h:29:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char product_name[PCI_PRODUCT_NAME_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/pci.h:30:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linux_kernel_module[LINUX_KERNEL_MODULE_SIZE] data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/pci.h:33:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char class_name[PCI_CLASS_NAME_SIZE]; /* The most precise class name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/sys/pci.h:34:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char category_name[PCI_CLASS_NAME_SIZE]; /*The general category */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/disk.h:81:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reserved1[3]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/disk.h:82:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostbus[4]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/disk.h:83:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char if_type[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/disk.h:84:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char if_path[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/disk.h:85:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dev_path[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/disk.h:113:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char code[440]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/disk.h:115:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pad[2]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/disk.h:142:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[72]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/disk.h:147:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sig[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/disk.h:154:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char raw[4]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/disk.h:158:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reserved1[4]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/disk.h:168:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reserved2[1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/unistd.h:15:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). __extern int open(const char *, int, ...); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/atoi.c:2:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). #define NAME atoi data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/atol.c:2:14: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). #define NAME atol data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/creat.c:11:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return open(pathname, O_CREAT | O_WRONLY | O_TRUNC, mode); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/ctypes.c:10:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const unsigned char __ctypes[257] = { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/dhcppack.c:53:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(q, p, plen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/dhcppack.c:82:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ox, opt, sizeof ox); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/dhcppack.c:106:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ox, opt, sizeof ox); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/dhcppack.c:153:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pkt->file, opt[67].data, opt[67].len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/dhcppack.c:162:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pkt->sname, opt[66].data, opt[66].len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/dhcpunpack.c:43:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)opt[op].data + opt[op].len, p, xlen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/dhcpunpack.c:43:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. memcpy((char *)opt[op].data + opt[op].len, p, xlen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/dhcpunpack.c:46:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. *((char *)opt[op].data + opt[op].len) = 0; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/dhcpunpack.c:92:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opt[67].data, pkt->file, opt[67].len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/dhcpunpack.c:93:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. *((char *)opt[67].data + opt[67].len) = 0; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/dhcpunpack.c:107:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opt[66].data, pkt->file, opt[66].len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/dhcpunpack.c:108:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. *((char *)opt[66].data + opt[66].len) = 0; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fopen.c:9:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fopen(const char *file, const char *mode) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fopen.c:37:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(file, flags, 0666); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/getopt.c:72:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. optarg = (char *)argv[optind+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/getopt_long.c:127:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. optarg = (char *)argv[optind+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/inet.c:34:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/inet.c:37:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%u.%u.%u.%u", bytes[0], bytes[1], bytes[2], bytes[3]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/grey.c:60:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, y, sx); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/grey.c:84:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, y, sx); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/tinyjpeg-internal.h:60:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char code_size[HUFFMAN_HASH_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/tinyjpeg.c:44:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char error_string[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/tinyjpeg.c:46:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char zigzag[64] = data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/tinyjpeg.c:60:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char bits_dc_luminance[17] = data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/tinyjpeg.c:69:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char bits_dc_chrominance[17] = data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/tinyjpeg.c:78:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char bits_ac_luminance[17] = data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/tinyjpeg.c:107:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char bits_ac_chrominance[17] = data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/tinyjpeg.c:333:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char huffsize[HUFFMAN_BITS_SIZE+1], *hz; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/tinyjpeg.c:612:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char huff_bits[17]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/yuv420p.c:77:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, y, sx); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/yuv420p.c:123:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, y1, sx); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/yuv420p.c:134:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, s, sx); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/yuv420p.c:143:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, s, sx); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/yuv420p.c:168:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, y, sx); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/yuv420p.c:216:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, y1, sx); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/yuv420p.c:227:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, s, sx); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/jpeg/yuv420p.c:236:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, s, sx); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/example.c:250:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PNG_BYTES_TO_CHECK]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/example.c:253:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((*fp = fopen(file_name, "rb")) == NULL) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/example.c:282:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(file_name, "rb")) == NULL) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/example.c:747:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(file_name, "wb"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/png.c:223:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char m[128]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/png.c:737:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. png_convert_to_rfc1123_buffer(char out[29], png_const_timep ptime) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/png.c:739:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char short_months[12][4] = data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/png.c:755:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char number_buf[5]; /* enough for a four-digit year */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/png.c:1827:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[196]; /* see below for calculation */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/png.c:1846:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char number[PNG_NUMBER_BUFFER_SIZE]; /* +24 = 114*/ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/png.c:2984:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char exponent[10]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/png.c:3254:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char digits[10]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:43:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:258:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[PNG_NUMBER_BUFFER_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:268:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[PNG_NUMBER_BUFFER_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:293:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[192]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:428:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char png_digit[16] = { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:483:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[18+PNG_MAX_ERROR_TEXT]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:499:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[18+PNG_MAX_ERROR_TEXT]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:577:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[fixed_message_ln+PNG_MAX_ERROR_TEXT]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:578:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msg, fixed_message, fixed_message_ln); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:721:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_number[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngerror.c:792:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char warning_number[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngmem.c:154:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_array, old_array, element_size*(unsigned)old_elements); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngpread.c:439:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, png_ptr->save_buffer_ptr, save_size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngpread.c:456:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, png_ptr->current_buffer_ptr, save_size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngpread.c:506:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(png_ptr->save_buffer, old_buffer, png_ptr->save_buffer_size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngpread.c:514:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(png_ptr->save_buffer + png_ptr->save_buffer_size, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngpread.c:765:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(png_ptr->prev_row, png_ptr->row_buf, row_info.rowbytes + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngread.c:559:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(png_ptr->prev_row, png_ptr->row_buf, row_info.rowbytes + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngread.c:1502:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen(file_name, "rb"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngread.c:1550:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, memory, need); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngrutil.c:346:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngrutil.c:691:28: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(text, png_ptr->read_buffer, prefix_size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngrutil.c:1410:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyword[81]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngrutil.c:1488:28: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(profile, profile_header, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngrutil.c:1554:43: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(info_ptr->iccp_name, keyword, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngrutil.c:3650:19: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dp, sp, bytes_to_copy); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngrutil.c:3675:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dp, sp, PNG_ROWBYTES(pixel_depth, row_width)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngrutil.c:3907:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v, sp, pixel_bytes); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngrutil.c:3911:19: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dp, v, pixel_bytes); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:368:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(info_ptr->pcal_purpose, purpose, length); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:390:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(info_ptr->pcal_units, units, length); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:420:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(info_ptr->pcal_params[i], params[i], length); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:470:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(info_ptr->scal_s_width, swidth, lengthw); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:489:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(info_ptr->scal_s_height, sheight, lengthh); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:512:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char swidth[PNG_sCAL_MAX_DIGITS+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:513:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sheight[PNG_sCAL_MAX_DIGITS+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:542:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char swidth[PNG_sCAL_MAX_DIGITS+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:543:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sheight[PNG_sCAL_MAX_DIGITS+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:626:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(png_ptr->palette, palette, (unsigned int)num_palette * data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:735:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_iccp_name, name, length); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:748:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_iccp_profile, profile, proflen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:918:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textp->key, text_ptr[i].key, key_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:924:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textp->lang, text_ptr[i].lang, lang_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:927:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textp->lang_key, text_ptr[i].lang_key, lang_key_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:940:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textp->text, text_ptr[i].text, text_length); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:1021:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(info_ptr->trans_alpha, trans_alpha, (size_t)num_trans); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:1123:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(np->name, entries->name, length); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:1143:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(np->entries, entries->entries, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:1262:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(np->name, unknowns->name, (sizeof np->name)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:1285:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(np->data, unknowns->data, unknowns->size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:1364:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(list, add, 4); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:1465:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_list, png_ptr->chunk_list, 5*old_num_chunks); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:1498:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outlist, inlist, 5); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngtest.c:125:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tIME_string[PNG_tIME_STRING_LENGTH] = "tIME chunk is not present"; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngtest.c:882:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fpin = fopen(inname, "rb")) == NULL) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngtest.c:888:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fpout = fopen(outname, "wb")) == NULL) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngtest.c:1709:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fpin = fopen(inname, "rb")) == NULL) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngtest.c:1715:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fpout = fopen(outname, "rb")) == NULL) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngtest.c:1730:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inbuf[256], outbuf[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwrite.c:842:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(png_ptr->row_buf + 1, row, row_info.rowbytes); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwrite.c:2182:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(display->memory+ob, data, size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwrite.c:2341:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen(file_name, "wb"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwutil.c:298:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwutil.c:1828:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + 1, width, wlen + 1); /* Append the '\0' here */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwutil.c:1829:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + wlen + 2, height, hlen); /* Do NOT append the '\0' here */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwutil.c:2248:19: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dp, sp, pixel_bytes); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/lstrdup.c:15:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, s, l); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/memcpy.c:8:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. void *memcpy(void *dst, const void *src, size_t n) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/mempcpy.c:13:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. return (char *)memcpy(dst, src, n) + n; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:69:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_LINE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:70:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char module_name[21]; // the module name field is 21 char long data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:72:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vendor_id[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:73:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char product_id[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:74:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sub_vendor_id[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:75:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sub_product_id[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:99:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vendor_id,"0000"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:100:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(product_id,"0000"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:101:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(sub_product_id,"0000"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:102:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(sub_vendor_id,"0000"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:175:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_LINE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:176:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char class_name[PCI_CLASS_NAME_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:177:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sub_class_name[PCI_CLASS_NAME_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:178:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char class_id_str[5]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:179:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sub_class_id_str[5]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:268:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_LINE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:269:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vendor[PCI_VENDOR_NAME_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:270:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vendor_id[5]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:271:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char product[PCI_PRODUCT_NAME_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:272:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char product_id[5]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:273:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sub_product_id[5]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:274:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sub_vendor_id[5]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:597:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_LINE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:598:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char module_name[21]; // the module name field is 21 char long data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:600:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vendor_id[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:601:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char product_id[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:602:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sub_vendor_id[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:603:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sub_product_id[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:641:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vendor_id,"0000"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:642:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(product_id,"0000"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:645:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(sub_product_id,"ffff"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:646:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(sub_vendor_id,"ffff"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/seed48.c:14:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(oldseed, __rand48_seed, sizeof __rand48_seed); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/seed48.c:15:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(__rand48_seed, xsubi, sizeof __rand48_seed); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strdup.c:14:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, s, l); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strerror.c:9:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char message[32] = "error "; /* enough for error 2^63-1 */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strerror.c:10:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char numbuf[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strerror.c:18:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return (char *)sys_errlist[e]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strerror.c:28:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(message + 6, p, (numbuf + sizeof numbuf) - p); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strndup.c:14:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, s, l); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strreplace.c:52:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, string, token - string); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strreplace.c:53:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out + (token - string), string_to_insert, silen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strreplace.c:54:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out + (token - string) + silen, token + srlen, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/ansi.c:67:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ti->ts, &default_state, sizeof default_state); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/ansi.c:151:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&st, &default_state, sizeof st); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/file.h:62:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int (*open)(struct file_info *); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/file.h:71:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int (*open)(struct file_info *); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/file.h:96:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXBLOCK]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/fileread.c:86:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bufp, fp->i.datap, ncopy); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/libansi.c:56:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[10]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/libansi.c:64:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[10]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/libansi.c:89:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[10]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/libansi.c:131:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char ansi_char[8] = "04261537"; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/libansi.c:133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16], *p; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/common.c:63:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[FILENAME_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/common.c:66:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(name, "rb"); /* for full path */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/common.c:81:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(path, "rb"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/elf_module.c:234:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[2] = { NULL, NULL }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/elfutils.c:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[0]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/exec.c:97:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*argp, *arg, l); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/i386/elf_module.c:248:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void*)dest, (void*)sym_addr, sym_def->st_size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/x86_64/elf_module.c:248:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void*)dest, (void*)sym_addr, sym_def->st_size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/open.c:54:5: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int open(const char *pathname, int flags, ...) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/opendev.c:70:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (idev->open && (e = idev->open(fp))) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/opendev.c:70:31: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (idev->open && (e = idev->open(fp))) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/opendev.c:78:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (odev->open && (e = odev->open(fp))) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/opendev.c:78:31: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (odev->open && (e = odev->open(fp))) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/background.c:101:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dp, sp, xl*sizeof(uint32_t)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/background.c:211:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *components[1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/background.c:430:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(filename, "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/debug.h:14:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[65536]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/i915resolution.c:155:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char unknown[6]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/i915resolution.c:190:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[81], *p; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/initvesa.c:64:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, height); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/screencpy.c:72:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rowbuf[bytes + 4] __aligned(4); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/zfile.c:146:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(pathname, flags, 0); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/disk.c:284:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data, buf, count * diskinfo->bps); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/disk.c:325:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, data, count * diskinfo->bps); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/disk.c:472:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char guid_seq[sizeof(struct guid) * 2]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/disk.c:528:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char guid_text[37]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/disk.c:554:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char guid_text[37]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/floadfile.c:66:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data, prefix, prefix_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/floadfile.c:94:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data, prefix, prefix_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:42:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c_magic[6]; /* 070701 */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:43:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c_ino[8]; /* Inode number */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:44:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c_mode[8]; /* File mode and permissions */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:45:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c_uid[8]; /* uid */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:46:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c_gid[8]; /* gid */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:47:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c_nlink[8]; /* Number of links */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:48:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c_mtime[8]; /* Modification time */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:49:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c_filesize[8]; /* Size of data field */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:50:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c_maj[8]; /* File device major number */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:51:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c_min[8]; /* File device minor number */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:52:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c_rmaj[8]; /* Device node reference major number */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:53:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c_rmin[8]; /* Device node reference minor number */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:54:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c_namesize[8]; /* Length of filename including final \0 */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c_chksum[8]; /* Checksum if c_magic ends in 2 */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:85:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. bp += sprintf(bp, "070701%08x%08x%08x%08x%08x%08x%08x%08x%08x" data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:88:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bp, filename, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:129:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. bp += sprintf(bp, "070701%08x%08x%08x%08x%08x%08x%08zx%08x%08x" data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:132:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bp, filename, namelen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/load_linux.c:215:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&hdr, kernel_buf, sizeof hdr); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/loadfile.c:51:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/movebits.c:648:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[BUFSIZ]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/movebits.c:654:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(argv[1], "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/pxe_get_cached.c:80:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nbuf, bbuf, gci->BufferSize); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/pxe_get_nic.c:54:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(gnt, lgnt, sizeof(t_PXENV_UNDI_GET_NIC_TYPE)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vdprintf.c:47:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BUFFER_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vfprintf.c:15:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BUFFER_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/crc32.c:143:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen("crc32.h", "w"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/inflate.c:640:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hbuf[4]; /* buffer for gzip header crc calculation */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/inflate.c:1405:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[4]; /* to restore bit buffer to byte string */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/trees.c:328:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *header = fopen("trees.h", "w"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/zutil.c:13:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. z_const char * const z_errmsg[10] = { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/zutil.h:49:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern z_const char * const z_errmsg[10]; /* indexed by 2-zlib_error */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/zutil.h:109:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fopen((name), (mode), "mbc=60", "ctx=stm", "rfm=fix", "mrs=512") data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/zutil.h:202:30: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). # define F_OPEN(name, mode) fopen((name), (mode)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/zlib/zutil.h:226:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define zmemcpy memcpy data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/cpio.c:17:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char pad[4]; /* Up to 4 zero bytes */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/cpio.c:28:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hdr[6+13*8+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/cpio.c:34:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hdr, "%06o%08x%08x%08x%08x%08x%08x%08zx%08x%08x%08x%08x%08x%08x", data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/upload_srec.c:15:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2+2+8+255*2+2+2]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/upload_srec.c:37:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, "S%c%02X%0*X", type, len+alen+1, alen*2, addr); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/upload_srec.c:39:14: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, "%02X", dptr[i]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/upload_srec.c:40:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, "%02X\n", csum); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/upload_srec.c:48:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[33]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/upload_tftp.c:39:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char url_path[255]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/upload_ymodem.c:142:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk_buf+3, buf, chunk); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/base64.c:79:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/crypt-md5.c:37:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char itoa64[64] = "./0123456789" data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/crypt-md5.c:55:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char passwd[120]; /* Output buffer */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/crypt-md5.c:105:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, magic, magic_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/crypt-md5.c:108:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, sp, sl); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/include/md5.h:37:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[64]; /* input buffer */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/include/sha1.h:9:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/include/sha1.h:12:54: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void SHA1Transform(uint32_t state[5], const unsigned char buffer[64]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/include/sha1.h:16:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void SHA1Final(unsigned char digest[20], SHA1_CTX * context); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/keyname.c:107:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[4]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/md5.c:35:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define Encode memcpy data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/md5.c:36:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define Decode memcpy data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/md5.c:38:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char PADDING[64] = { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/md5.c:115:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)&context->buffer[idx], (const void *)input, partLen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/md5.c:126:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)&context->buffer[idx], (const void *)&input[i], data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/md5.c:136:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char bits[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/md5.c:156:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void MD5Final(unsigned char digest[16], MD5_CTX * context) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/md5.c:172:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const unsigned char block[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha1hash.c:115:54: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void SHA1Transform(uint32_t state[5], const unsigned char buffer[64]) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha1hash.c:119:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char c[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha1hash.c:124:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char workspace[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha1hash.c:126:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(block, buffer, 64); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha1hash.c:255:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&context->buffer[j], data, (i = 64 - j)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha1hash.c:263:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&context->buffer[j], &data[i], len - i); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha1hash.c:271:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void SHA1Final(unsigned char digest[20], SHA1_CTX * context) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha1hash.c:274:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char finalcount[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha1hash.c:306:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *mybase64(uint8_t digest[20]) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha1hash.c:311:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char output[28]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha1hash.c:317:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(input, digest, 20); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha1hash.c:346:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(file = fopen(argv[1], "rb"))) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:27:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[128]; /* NB: always correctly aligned for uint32_t. */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:39:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char fillbuf[64] = { 0x80, 0 /* , 0, 0, ... */ }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:193:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ctx->buffer[bytes], fillbuf, pad); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:219:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ctx->buffer[left_over], buffer, add); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:227:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctx->buffer, &ctx->buffer[(left_over + add) & ~63], data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:246:24: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. sha256_process_block(memcpy(ctx->buffer, buffer, 64), 64, ctx); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:260:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ctx->buffer[left_over], buffer, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:265:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctx->buffer, &ctx->buffer[64], left_over); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:288:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char b64t[64] = data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:294:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char alt_result[32] data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:296:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char temp_result[32] data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:335:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. key = copied_key = memcpy(tmp + __alignof__(uint32_t) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:342:23: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. salt = copied_salt = memcpy(tmp + __alignof__(uint32_t) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:405:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, temp_result, cnt); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:421:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, temp_result, cnt); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:549:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char result[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:627:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sum[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:651:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:657:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char expected[32] = data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:27:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[256]; /* NB: always correctly aligned for uint64_t. */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:46:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char fillbuf[128] = { 0x80, 0 /* , 0, 0, ... */ }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:224:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ctx->buffer[bytes], fillbuf, pad); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:250:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ctx->buffer[left_over], buffer, add); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:258:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctx->buffer, &ctx->buffer[(left_over + add) & ~127], data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:278:24: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. sha512_process_block(memcpy(ctx->buffer, buffer, 128), 128, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:295:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ctx->buffer[left_over], buffer, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:300:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctx->buffer, &ctx->buffer[128], left_over); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:323:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char b64t[64] = data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:329:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char alt_result[64] data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:331:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char temp_result[64] data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:370:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. key = copied_key = memcpy(tmp + __alignof__(uint64_t) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:377:23: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. salt = copied_salt = memcpy(tmp + __alignof__(uint64_t) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:440:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, temp_result, cnt); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:456:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, temp_result, cnt); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:596:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char result[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:694:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sum[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:718:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:724:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char expected[64] = data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/unbase64.c:44:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char base64tbl[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/cpu.c:25:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32] = { 0 }; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:104:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char op_name[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:105:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char op_value[255]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:111:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(op_name, "%u", option); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:113:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(op_value, "%u.%u.%u.%u", value[0], value[1], value[2], value[3]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:118:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(op_name, "%u.%d", option, done+1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:120:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(op_value, "%u.%u.%u.%u", value[0+(done*4)], value[1+(done*4)], value[2+(done*4)], value[3+(done*4)]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:150:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char op_name[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:204:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(op_name, "%u", option); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:214:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(op_name, "%u", option); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:234:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(op_name, "%u", option); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:243:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(op_name, "%u", option); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:260:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char dhcp_arg[STR_BUF_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:302:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dhcp_arg, "%u.%u.%u.%u", dhcp->ciaddr[0], dhcp->ciaddr[1], dhcp->ciaddr[2], dhcp->ciaddr[3]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:307:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dhcp_arg, "%u.%u.%u.%u", dhcp->yiaddr[0], dhcp->yiaddr[1], dhcp->yiaddr[2], dhcp->yiaddr[3]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:312:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dhcp_arg, "%u.%u.%u.%u", dhcp->siaddr[0], dhcp->siaddr[1], dhcp->siaddr[2], dhcp->siaddr[3]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:317:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dhcp_arg, "%u.%u.%u.%u", dhcp->giaddr[0], dhcp->giaddr[1], dhcp->giaddr[2], dhcp->giaddr[3]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:322:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dhcp_arg, "%02X:%02X:%02X:%02X:%02X:%02X", data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/dhcp.c:341:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dhcp_arg, "%u.%u.%u.%u", dhcp->cookie[0], dhcp->cookie[1], dhcp->cookie[2], dhcp->cookie[3]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lauxlib.c:449:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newbuff, B->b, B->n * sizeof(char)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lauxlib.c:461:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, s, l * sizeof(char)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lauxlib.c:565:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[LUAL_BUFFERSIZE]; /* area for reading file */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lauxlib.c:642:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). lf.f = fopen(filename, "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lauxlib.h:148:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char initb[LUAL_BUFFERSIZE]; /* initial buffer */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ldblib.c:327:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[5]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ldblib.c:346:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[250]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ldebug.c:560:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[LUA_IDSIZE]; /* add file:line information */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lfs.c:58:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open (path, O_RDONLY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lfs.c:102:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/liolib.c:220:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). p->f = fopen(fname, mode); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/liolib.c:232:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). p->f = fopen(filename, mode); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/liolib.c:259:10: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). p->f = tmpfile(); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/llex.c:109:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[LUA_IDSIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loadlib.c:173:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[MAX_PATH + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loadlib.c:189:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[128]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loadlib.c:380:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *f = fopen(filename, "r"); /* try to open file */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lobject.c:208:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[4*sizeof(void *) + 8]; /* should be enough space for a `%p' */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lobject.c:209:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int l = sprintf(buff, "%p", va_arg(argp, void *)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lobject.c:250:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define addstr(a,b,l) ( memcpy(a,b,(l) * sizeof(char)), a += (l) ) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lobject.c:256:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, source + 1, l * sizeof(char)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lobject.c:264:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, source + 1, l * sizeof(char)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lobject.c:268:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, source + 1 + l - bufflen, bufflen * sizeof(char)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lobject.c:284:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, POS, (LL(POS) + 1) * sizeof(char)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lopcodes.c:17:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LUAI_DDEF const char *const luaP_opnames[NUM_OPCODES+1] = { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lopcodes.h:281:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LUAI_DDEC const char *const luaP_opnames[NUM_OPCODES+1]; /* opcode names */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loslib.c:52:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(b, "/tmp/lua_XXXXXX"); \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loslib.c:53:13: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). e = mkstemp(b); \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loslib.c:109:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[LUA_TMPNAMBUFSIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loslib.c:225:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cc[4]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loslib.c:234:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[200]; /* should be big enough for any conversion result */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstate.c:66:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[LUAI_EXTRASPACE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstate.c:92:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff + p, &t, sizeof(t)); p += sizeof(t); } data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstate.c:95:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[4 * sizeof(size_t)]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstring.c:107:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ts+1, str, l*sizeof(char)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:121:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, s, l * sizeof(char)); p += l; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:123:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, sep, lsep * sizeof(char)); p += lsep; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:126:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, s, l * sizeof(char)); /* last copy (not followed by separator) */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:843:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[10]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:845:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buff, "\\%d", (int)uchar(*s)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:847:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buff, "\\%03d", (int)uchar(*s)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:872:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(form, strfrmt, (p - strfrmt + 1) * sizeof(char)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:906:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char form[MAX_FORMAT]; /* to store the format (`%...') */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ltm.c:24:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LUAI_DDEF const char *const luaT_typenames_[LUA_TOTALTAGS] = { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ltm.h:49:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LUAI_DDEC const char *const luaT_typenames_[LUA_TOTALTAGS]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lua.c:268:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[LUA_MAXINPUT]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lua.h:417:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char short_src[LUA_IDSIZE]; /* (S) */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/luac.c:178:38: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* D= (output==NULL) ? stdout : fopen(output,"wb"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lundump.c:195:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s,h,sizeof(char)); /* first char already read */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lundump.c:247:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(h,LUA_SIGNATURE,sizeof(LUA_SIGNATURE)-sizeof(char)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lundump.c:257:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(h,LUAC_TAIL,sizeof(LUAC_TAIL)-sizeof(char)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lvm.c:74:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[LUAI_MAXNUMBER2STR]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lvm.c:347:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer+tl, svalue(top-i), l * sizeof(char)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lzio.c:58:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, z->p, m); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/pci.c:77:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[1024]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/pci.c:78:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vendor[255]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/pci.c:79:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vendor_id[5]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/pci.c:80:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char product[255]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/pci.c:81:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char productvendor[9]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/pci.c:82:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char productvendorsub[17]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/pci.c:94:5: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f=fopen(pciidfile,"r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/syslinux.c:95:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, *arg, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/syslinux.c:156:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(newcmdline, "BOOT_IMAGE="); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/syslinux.c:245:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (file->name, filename, name_len+1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/syslinux.c:313:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (data, file_data, file_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/syslinux.c:354:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (cmdline, cmdline_param, len+1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/vesa.c:53:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&__vesa_info.gi, gi, sizeof *gi); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/mboot/initvesa.c:89:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&vesa_info.gi, gi, sizeof *gi); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/mboot/initvesa.c:186:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&vesa_info.mi, mi, sizeof *mi); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/colors.c:130:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char msg_names[6 * 256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/colors.c:148:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. mp += sprintf(mp, "msg%02x", i) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/menumain.c:75:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[MAX_CMDLINE_LEN]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/menumain.c:88:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer + p, text, n); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/menumain.c:215:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char user_passwd[WIDTH], *p; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/menumain.c:448:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cmdline[MAX_CMDLINE_LEN]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/menumain.c:616:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/menumain.c:625:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. nnc = sprintf(tq, "\2#15%d\2#14", tol); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/passwd.c:24:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char sha1[20], pwdsha1[20]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/printmsg.c:44:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:40:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *hide_key[KEY_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:61:34: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if ( __p ) memcpy(__p, __x, __n); \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:155:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(q, str, p - str); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:180:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m->mparm, parent->mparm, sizeof m->mparm); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:330:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipoptions[4096], *ipp; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:653:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_LINE], *p, *ep, ch; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:873:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ld.menuindent = atoi(skipspace(p + 6)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:932:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). m->mparm[mp] = atoi(skipspace(ep)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:962:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ld.helptext + len, line, xlen + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:1040:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). m->timeout = (atoi(skipspace(p + 7)) * CLK_TCK + 9) / 10; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:1046:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). m->allowedit = !!atoi(skipspace(p + 12)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:1072:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:1152:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lstr, lbl, len); /* refstr_alloc() adds the final null */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/refstr.c:47:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(r, str, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/refstr.c:62:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(r, str, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/cat.c:10:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/cat.c:18:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(argv[i], "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/cptime.c:150:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ibufsz + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/cptime.c:157:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(fn, "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/cptime.c:240:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tbufsz = atoi(argv[i]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/cptime.c:248:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tmaxlen = atoi(argv[i]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/dir.c:104:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nde, de, de->d_reclen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/dmitest.c:180:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/elf.c:212:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sfp, *argp, bytes); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ethersel.c:110:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_LINE], *p; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ethersel.c:119:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/hexdump.c:102:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ifcpu.c:94:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char **args[3]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ifcpu64.c:103:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char **args[3]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ifplop.c:144:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char **args[2]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/kbdmap.c:50:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(kmap->map, kbdmap, map_size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/kontron_wdt.c:44:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char default_label[255]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/kontron_wdt.c:353:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). wdt.timeout=atoi(argv[i]+8); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/linux.c:129:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, *arg, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/linux.c:295:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(boot_image, "BOOT_IMAGE="); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ls.c:104:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nde, de, de->d_reclen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/meminfo.c:63:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(low_ed, &ed, sizeof ed); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/meminfo.c:70:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ed, low_ed, sizeof ed); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pcitest.c:49:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tempbuf[10]; \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pcitest.c:60:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kernel_modules[LINUX_KERNEL_MODULE_SIZE * data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pmload.c:146:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sfp, *argp, bytes); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pwd.c:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pwd[PATH_MAX], *pwdptr; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c:123:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[PXECHN_HOST_LEN]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c:125:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p_unpacked[PXECHN_NUM_PKT_TYPE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c:382:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(host, fn, hlen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c:395:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(host, (csep + 3), hlen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c:445:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pxe->p[p2].data, pxe->p[p1].data, pxe->p[p1].len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c:558:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opt->data, data, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c:592:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data, &optval, tlen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c:600:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data, &optval, tlen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c:691:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iopt->data, pos, iopt->len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c:856:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, opts[66].data, opts[66].len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c:910:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (!(memcpy(cp, p, len))) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/sdi.c:41:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Version[4]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/whichsys.c:34:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char **arg[1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:52:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char env[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:121:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src + bpos, epos - bpos); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:347:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmdstr + curpos, argv[i], arglen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:429:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ROSH_BUF_SZ]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:435:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(argv[i], "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:459:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filestr[ROSH_PATH_SZ]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:555:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filestr2[ROSH_PATH_SZ]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:563:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(filestr2, filestr, file2pos); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:567:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd2 = open(filestr2, O_RDONLY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:581:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filestr2[ROSH_PATH_SZ]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:593:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(filestr2, filestr, file2pos); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:767:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char st_mode_str[11]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:963:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(scrbuf, bufp, bufcnt); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:1052:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(argv[i], O_RDONLY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:1080:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pwdstr[ROSH_PATH_SZ]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:1125:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdstr[ROSH_CMD_SZ]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:1316:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdstr[ROSH_CMD_SZ]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:1317:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipwdstr[ROSH_PATH_SZ]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:1325:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ipwdstr, "./"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:1355:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdstr[ROSH_CMD_SZ]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.h:94:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(pathname, O_RDONLY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.h:159:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *rows = atoi(str); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.h:164:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *cols = atoi(str); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/samples/advdump.c:28:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/samples/advdump.c:50:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, p, l); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/samples/fancyhello.c:28:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/samples/localboot.c:6:36: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). syslinux_local_boot(argc > 1 ? atoi(argv[1]) : 0); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/acpi.c:26:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oemid[6]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/acpi.c:36:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sig[4]; /* Signature */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/acpi.c:40:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oemid[6]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/acpi.c:41:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oemtblid[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/acpi.c:156:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char namebuf[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/dmi.c:11:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char signature[5]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/dmi.c:21:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char signature[4]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/dmi.c:66:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/dmi.c:89:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pad[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/dmi.c:91:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/memmap.c:50:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf[nentry].data, curr->data, sizeof curr->data); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/memory.c:25:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lowmem, zero_addr, lowmem_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/memory.c:34:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/memory.c:36:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(filename, "memory/%08zx", (size_t)addr); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/pci.c:18:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/vesa.c:13:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modefile[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/vesa.c:30:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gi, gip, sizeof gi); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/vesa.c:55:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mi, mip, sizeof mi); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/sysdump/vesa.c:57:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(modefile, "vesa/mode%04x.bin", mode); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/bios.c:258:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&vesa_info->gi, gi, sizeof *gi); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/bios.c:355:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&vesa_info->mi, mi, sizeof *mi); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/bios.c:421:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(win_base + win_off, s, l); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/bios.c:484:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/conio.c:61:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/dmi.c:46:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char signature[5]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/dmi.c:56:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char signature[4]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/dmi.c:293:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(q, pfx, pfxlen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/dmi.c:295:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(q, str, ep-str); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/dmi.c:309:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sysff_str+6, "%u", *type & 0x7f); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/dmi.c:320:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cpu_str[6+6] = "CPU="; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/elflink/load_env32.c:140:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stackargs, heapargs, argsmem); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/elflink/load_env32.c:161:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char realname[FILENAME_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/elflink/load_env32.c:208:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[FILENAME_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/font.c:34:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. __export __lowmem char fontbuf[8192]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/font.c:52:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/btrfs/btrfs.c:530:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dirent->d_name, dir_item + 1, dir_item->name_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/btrfs/btrfs.c:603:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, buf + off, ret); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/btrfs/btrfs.h:119:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[BTRFS_LABEL_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/cache.c:153:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, cd + off, cnt); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/chdir.c:91:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd_buf[CURRENTDIR_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/chdir.c:126:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(this_fs->cwd_name, cwd_buf, s); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/diskio_bios.c:32:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bus_type[4]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/diskio_bios.c:33:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char if_type[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/diskio_bios.c:98:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tptr, ptr, bytes); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/diskio_bios.c:149:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, tptr, bytes); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/diskio_bios.c:208:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tptr, ptr, bytes); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/diskio_bios.c:275:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, tptr, bytes); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ext2/ext2.c:162:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(PVT(inode)->i_block, e_inode->i_block, sizeof PVT(inode)->i_block); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ext2/ext2.c:216:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, data, chunk); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ext2/ext2.c:236:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, PVT(inode)->i_block, inode->size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ext2/ext2.c:265:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dirent->d_name, de->d_name, de->d_name_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ext2/ext2_fs.h:103:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_volume_name[16]; /* volume name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ext2/ext2_fs.h:104:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_last_mounted[64]; /* directory where last mounted */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ext2/ext2_fs.h:214:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d_name[EXT2_NAME_LEN]; /* File name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fat/fat.c:399:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, le->name1, 5 * 2); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fat/fat.c:400:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + 5, le->name2, 6 * 2); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fat/fat.c:401:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + 11, le->name3, 2 * 2); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fat/fat.c:445:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mangled_name[12]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fat/fat.c:599:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[261]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fat/fat.c:715:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dirent->d_name, filename, name_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fat/fat.c:816:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, (void *)&fat + sb_off, sb_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fat/fat_fs.h:106:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[11]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fs.c:344:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mangled_name[FILENAME_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/iso9660/iso9660.c:72:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iso_file_name[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/iso9660/iso9660.c:243:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dirent->d_name, rr_name, name_len + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/iso9660/iso9660.c:280:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pvd[2048]; /* Primary Volume Descriptor */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/iso9660/iso9660_fs.h:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[0]; /* 21 */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/iso9660/susp_rr.c:58:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/iso9660/susp_rr.c:211:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iter->ce_data + i * 2048, data, 2048); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/iso9660/susp_rr.c:373:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_data, *data, *len_data); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/iso9660/susp_rr.c:378:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*data + *len_data, pos_pt + head_skip, pay_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/lib/searchconfig.c:8:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. __export char ConfigName[FILENAME_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/lib/searchconfig.c:9:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. __export char config_cwd[FILENAME_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/lib/searchconfig.c:21:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char namebuf[FILENAME_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ntfs/ntfs.c:140:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, data + offset, bytes); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ntfs/ntfs.c:149:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + k, data + offset, lbytes); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ntfs/ntfs.c:998:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, p, inode->size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ntfs/ntfs.c:1040:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[NTFS_MAX_FILE_NAME_LEN + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ntfs/ntfs.c:1206:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dirent->d_name, filename, len + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ntfs/ntfs.h:27:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oem_name[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/bios.c:443:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(MAC, bp->macaddr, MAC_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/core.c:154:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pbuf, data, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/core.c:196:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pbuf, data, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/dhcp_option.c:9:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char LocalDomain[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/dhcp_option.c:51:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(LocalDomain, data, opt_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/dhcp_option.c:92:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(MAC, data+1, opt_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/dhcp_option.c:98:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(boot_file, data, opt_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/dhcp_option.c:110:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uuid, data+1, 16); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/dhcp_option.c:116:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ConfigName, data, opt_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/dhcp_option.c:123:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(path_prefix, data, opt_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/dnsresolv.c:95:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullname[512]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/ftp.c:41:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd_buf[4096]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/ftp_readdir.c:48:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bufs[2][FILENAME_MAX + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/ftp_readdir.c:134:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dirent->d_name, name, len+1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/http.c:57:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char uchexchar[16] = "0123456789ABCDEF"; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/http.c:69:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(q, "Cookie: "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/http.c:76:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(q, "_Syslinux_"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/http.c:161:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char field_name[20]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/http.c:162:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char field_value[1024]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/http.c:175:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char location[FILENAME_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/http.c:205:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(header_buf, "GET /"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/http_readdir.c:66:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char entity[9]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/http_readdir.c:328:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entity_buf[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/http_readdir.c:436:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[FILENAME_MAX + 6]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/http_readdir.c:467:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dirent->d_name, fn, sp-fn); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:21:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char boot_file[256]; /* From DHCP */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:22:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path_prefix[256]; /* From DHCP */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:94:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. return sprintf(dst, "%u.%u.%u.%u", data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:215:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, socket->tftp_dataptr, chunk); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:287:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullpath[2*FILENAME_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:289:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char urlsave[2*FILENAME_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:326:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). us->open(&url, flags, inode, &filename); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:476:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(config_file, "%08X", ntohl(IPInfo.myip)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:500:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char bootif_str[7+3*(MAC_MAX+1)]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:505:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. dst += sprintf(dst, "BOOTIF=%02x", MAC_type); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:508:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. dst += sprintf(dst, "-%02x", *src++); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:520:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ip_option[3+4*16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:541:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dot_quad_buf[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:603:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(fs->cwd_name, "::"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:675:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst+52, int18_hack, sizeof int18_hack); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.h:103:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bootfile[128]; /* Boot file name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.h:188:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). void (*open)(struct url_info *, int, struct inode *, const char **); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/tftp.c:42:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_msg[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/tftp.c:49:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(err_buf.err_msg, errstr, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/tftp.c:195:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rrq_packet_buf[2+2*FILENAME_MAX+sizeof rrq_tail]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/tftp.c:196:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reply_packet_buf[PKTBUF_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/tftp.c:234:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, rrq_tail, sizeof rrq_tail); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/tftp.c:334:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(socket->tftp_pktbuf, data, buffersize); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/tftp.c:446:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wrq_packet_buf[512+4+6]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/tftp.c:447:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reply_packet_buf[PKTBUF_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/tftp.c:486:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, wrq_tail, sizeof wrq_tail); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/tftp.c:571:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+4, data, chunk); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/tftp.h:61:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errmsg[0]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ufs/bmap.c:27:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uint8_t *) &addr, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ufs/ufs.c:253:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(inode->pvt, ufs_inode->direct_blk_ptr, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ufs/ufs.c:299:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, (const char *) dest, inode->size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ufs/ufs.c:304:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, (const char *) (inode->pvt), inode->size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ufs/ufs.c:326:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, data, chunk); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ufs/ufs.c:393:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dirent->d_name, dir->name, dir->name_length); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs.c:286:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, XFS_DFORK_PTR(core, XFS_DATA_FORK), pathlen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs.c:297:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, dir_buf, pathlen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs.h:159:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sb_fname[12]; /* file system name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_fs.h:49:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char fsx_pad[12]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_fs.h:167:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char uuid[16]; /* unique id of the filesystem */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_fs.h:193:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char uuid[16]; /* unique id of the filesystem */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_fs.h:300:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char bs_pad[10]; /* pad space, unused */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_readdir.c:58:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dirent->d_name, name, namelen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_sb.h:29:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef unsigned char uuid_t[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/graphics.c:34:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. __export char VGAFileBuf[VGA_FILE_BUF_SIZE]; /* Unmangled VGA image name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/graphics.c:35:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. __export char VGAFileMBuf[FILENAME_MAX]; /* Mangled VGA image name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/graphics.c:228:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, in, 640/8); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/core.h:18:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char core_xfer_buf[65536]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/core.h:19:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char core_cache_buf[65536]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/core.h:91:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char *sysappend_strings[SYSAPPEND_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/fs.h:38:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd_name[CURRENTDIR_MAX]; /* Current directory by name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/fs.h:116:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pvt[0]; /* Private filesystem data */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/graphics.h:45:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char VGAFileBuf[VGA_FILE_BUF_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/graphics.h:51:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char fontbuf[8192]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/legacynet/core.c:9:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static __lowmem char packet_buf[PKTBUF_SIZE] __aligned(16); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/legacynet/core.c:107:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, packet_buf, bytes); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/legacynet/core.c:134:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lbuf, data, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/legacynet/core.c:170:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lbuf, data, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/legacynet/core.c:258:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(socket->tftp_pktbuf, packet_buf, file_read.BufferSize); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/legacynet/core.c:295:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static __lowmem char lowurl[2*FILENAME_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/legacynet/dnsresolv.c:141:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(q, p, c0); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/legacynet/dnsresolv.c:213:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __lowmem DNSSendBuf[PKTBUF_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/legacynet/dnsresolv.c:214:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __lowmem DNSRecvBuf[PKTBUF_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/legacynet/idle.c:24:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static __lowmem char junk_pkt[PKTBUF_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/localboot.c:83:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)0x07C00, trackbuf, 512); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/api/netdb.c:288:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). port_nr = atoi(servname); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/dns.c:176:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[DNS_MAX_NAME_LENGTH]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/ipv4/ip_addr.c:263:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char str[16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/ipv4/ip_addr.c:279:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inv[3]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/memp.c:144:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *memp_desc[MEMP_MAX] = { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/memp.c:224:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errstr[128] = "detected memp overflow in pool "; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/memp.c:257:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errstr[128] = "detected memp underflow in pool "; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/snmp/msg_in.c:54:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char snmp_publiccommunity[7] = "public"; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/dhcp.h:64:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char boot_file_name[DHCP_FILE_LEN]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/netif.h:190:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[2]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/opt.h:84:41: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define MEMCPY(dst,src,len) memcpy(dst,src,len) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/opt.h:92:41: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define SMEMCPY(dst,src,len) memcpy(dst,src,len) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/snmp_msg.h:286:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char snmp_publiccommunity[7]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/sockets.h:56:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sin_zero[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/sockets.h:62:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sa_data[14]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/sockets.h:299:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char fd_bits [(FD_SETSIZE+7)/8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:99:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char peer_authname[MAXNAMELEN]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:180:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char remote_name[MAXNAMELEN]; /* Peer's name for authentication */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:194:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char word[1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:296:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ufile = fopen(*argv, "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:545:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). (*cbcp_protent.open)(unit); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:552:67: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (protp->protocol < 0xC000 && protp->enabled_flag && protp->open != NULL) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:553:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). (*protp->open)(unit); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:876:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char passwd[256], user[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:877:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secret[MAXWORDLEN]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:1031:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(user, "none"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:1034:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(passwd, "none"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:1103:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secbuf[MAXWORDLEN]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:1309:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strspeed[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:1311:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char struid[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:1313:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/chap.c:428:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secret[MAXSECRETLEN]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/chap.c:429:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rhostname[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/chap.c:526:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rhostname[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/chap.c:528:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secret[MAXSECRETLEN]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/chap.c:750:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[256]; /* @todo: this can be a char*, no strcpy needed */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/chap.c:753:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(msg, "Welcome!"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/chap.c:755:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(msg, "I don't like you. Go 'way."); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ipcp.c:1376:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. #define get_iphl(x) (((unsigned char *)(x))[0] & 0xF) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ipcp.c:1378:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. #define get_ipproto(x) (((unsigned char *)(x))[9]) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ipcp.c:1379:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. #define get_tcpoff(x) (((unsigned char *)(x))[12] >> 4) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ipcp.c:1380:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. #define get_tcpflags(x) (((unsigned char *)(x))[13]) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/lcp.c:1243:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char traceBuf[80]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/md5.c:61:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char PADDING[64] = { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/md5.h:47:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char in[64]; /* input buffer */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/md5.h:48:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[16]; /* actual digest after MD5Final call */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp.h:287:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). void (*open) (int unit); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp.h:332:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char user [MAXNAMELEN + 1]; /* Username for PAP */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp.h:333:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char passwd [MAXSECRETLEN + 1]; /* Password for PAP, secret for CHAP */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp.h:334:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char our_name [MAXNAMELEN + 1]; /* Our name for authentication purposes */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp.h:335:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char remote_name[MAXNAMELEN + 1]; /* Peer's name for authentication */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp_oe.c:113:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char pppoe_error_tmp[PPPOE_ERRORSTRING_LEN]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp_oe.c:291:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char devname[6]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp_oe.c:305:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(devname, "pppoe"); /* as long as we don't know which instance */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/randm.c:52:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char randPool[RANDPOOLSZ]; /* Pool of randomness. */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/vj.c:437:53: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. || (hlen += TCPH_OFFSET(((struct tcp_hdr *)&((char *)ip)[hlen])) << 2) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/vj.h:111:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csu_hdr[MAX_HDR]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/undiif.c:423:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(netif->hwaddr, MAC, MAC_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/undiif.c:475:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static __lowmem char pkt_buf[PKTBUF_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/undiif.c:520:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(low_dest, dest, netif->hwaddr_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/undiif.c:598:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hdr_ptr, netif->hwaddr, netif->hwaddr_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/undiif.c:600:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hdr_ptr, &netif->ip_addr, 4); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/undiif.c:604:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hdr_ptr, ipaddr, 4); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/undiif.c:1189:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s, r, qb); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/undiif.c:1270:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(arp_table[i].hwaddr, lladdr, netif->hwaddr_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/undiif.c:1355:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hwaddr_remote, hdr_ptr, netif->hwaddr_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/undiif.c:1399:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hdr_ptr, &netif->hwaddr, netif->hwaddr_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/undiif.c:1401:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hdr_ptr, &dipaddr, sizeof(dipaddr)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/undiif.c:1403:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hdr_ptr, &hwaddr_remote, netif->hwaddr_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/undiif.c:1405:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hdr_ptr, &sipaddr, sizeof(sipaddr)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/mem/malloc.c:235:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newptr, ptr, min(size, oldsize)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/serirq.c:26:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char serial_buf[serial_buf_size]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/serirq.c:32:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char IRQMask[2]; /* PIC IRQ mask status */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/sysappend.c:25:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. __export const char *sysappend_strings[SYSAPPEND_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/sysappend.c:84:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char sysuuid_str[8+32+5] = "SYSUUID="; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/sysappend.c:98:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. dst += sprintf(dst, "%02x", *src++); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/sysappend.c:112:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char fsuuid_str[7+32+7+1] = "FSUUID="; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/diag/geodsp/mk-lba-img.c:61:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(fn, "w"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/mystuff.h:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdtail[127]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/printf.c:46:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c, sign, tmp[66]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/printf.c:297:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char printf_buf[1024]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/string.h:11:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define memcpy(a,b,c) __builtin_memcpy(a,b,c) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/syslinux.c:532:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char sectbuf[SECTOR_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/syslinux.c:541:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sectbuf, syslinux_mbr, syslinux_mbr_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/syslinux.c:574:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char new_name[160]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/syslinux.c:603:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, filename, 12); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/syslinux.c:615:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char sectbuf[SECTOR_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dosutil/mdiskchk.c:144:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], *bc; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/adv.c:31:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char syslinux_adv[2 * ADV_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/adv.c:48:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(advbuf + ADV_SIZE, advbuf, ADV_SIZE); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/adv.c:81:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(advbuf + ADV_SIZE, advbuf, ADV_SIZE); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/adv.c:84:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(advbuf, advbuf + ADV_SIZE, ADV_SIZE); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/adv.c:218:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char advtmp[2 * ADV_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/adv.h:17:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern unsigned char syslinux_adv[2 * ADV_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/main.c:23:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CurrentDirName[CURRENTDIR_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/main.c:27:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __lowmem_heap[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/main.c:31:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aux_seg[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/main.c:194:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trackbuf[4096]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/main.c:203:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char core_xfer_buf[65536]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/main.c:340:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char SubvolName[2]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/main.c:896:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmdline, str, strlen(str) + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/main.c:992:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)(UINTN)last, ip->data, ip->data_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/main.c:1141:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)bp, kernel_buf, 2 * 512); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/main.c:1189:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)(UINTN)kernel_start, kernel_buf+setup_sz, kernel_size-setup_sz); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/main.c:1215:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bp->efi.load_signature, EFI_LOAD_SIG, sizeof(uint32_t)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/main.c:1271:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char free_high_memory[4096]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/mem.c:19:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newptr, ptr, size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/pxe.c:98:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dst[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/pxe.c:159:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(MAC, mode->DhcpAck.Dhcpv4.BootpHwAddr, MAC_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/pxe.c:171:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dst, "%u.%u.%u.%u", data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/tcp.c:66:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ap->RemoteAddress, &ip, sizeof(ip)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/tcp.c:202:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char databuf[8192]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/tcp.c:247:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(databuf, frag->FragmentBuffer, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/udp.c:146:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&udata.StationAddress, &IPInfo.myip, sizeof(IPInfo.myip)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/udp.c:147:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&udata.SubnetMask, &IPInfo.netmask, sizeof(IPInfo.netmask)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/udp.c:149:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&udata.RemoteAddress, &ip, sizeof(ip)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/udp.c:269:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, frag->FragmentBuffer, size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/udp.c:272:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(src_port, &rxdata->UdpSession.SourcePort, sizeof(*src_port)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/udp.c:273:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(src_ip, &rxdata->UdpSession.SourceAddress, sizeof(*src_ip)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/udp.c:386:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&udata.StationAddress, &IPInfo.myip, sizeof(IPInfo.myip)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/udp.c:387:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&udata.SubnetMask, &IPInfo.netmask, sizeof(IPInfo.netmask)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/udp.c:389:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&udata.RemoteAddress, &ip, sizeof(ip)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/vesa.c:236:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&vesa_info->mi, mi, sizeof *mi); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/vesa.c:285:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(win_base + win_off, s, bytes); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/wrapper.c:134:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy((char *)t_sec.name, ".text"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/wrapper.c:180:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f_in = fopen(argv[1], "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/wrapper.c:186:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f_out = fopen(argv[2], "w"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/btrfs.h:109:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[BTRFS_PATH_NAME_MAX + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/btrfs.h:181:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BTRFS_SEARCH_ARGS_BUFSIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:91:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char subvol[BTRFS_SUBVOL_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:128:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sysfs_name[128]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:141:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(sysfs_name, "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:191:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(geo, &gp->g, sizeof *geo); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:526:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, O_WRONLY | O_TRUNC | O_CREAT | O_SYNC, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:582:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dirfd = open(path, O_RDONLY | O_DIRECTORY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:588:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(file, O_RDONLY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:616:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(oldfile, O_RDONLY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:623:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(c32file, O_WRONLY | O_TRUNC | O_CREAT | O_SYNC, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:694:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(file, O_WRONLY | O_TRUNC | O_CREAT | O_SYNC, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:726:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char file[PATH_MAX + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:727:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char c32file[PATH_MAX + 1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:737:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dirfd = open(path, O_RDONLY | O_DIRECTORY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:743:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(file, O_RDONLY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:774:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(c32file, O_WRONLY | O_TRUNC | O_CREAT | O_SYNC, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:842:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirname[4096]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:847:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(rootdir, O_RDONLY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:1050:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char devname_buf[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:1068:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). pfd = open(path, O_RDONLY|O_DIRECTORY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:1179:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sysname[64]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:1180:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linkname[PATH_MAX]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:1202:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(q, "/dev/", 5); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:1292:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). pfd = open(path, O_RDONLY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:1312:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dfd = open((const char *)devinfo.path, O_RDONLY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:1451:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((devfd = open(devname, O_RDWR | O_SYNC)) < 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/mountinfo.c:85:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string_buf[PATH_MAX*8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/mountinfo.c:90:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("/proc/self/mountinfo", "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/xfs_fs.h:49:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char fsx_pad[12]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/xfs_fs.h:167:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char uuid[16]; /* unique id of the filesystem */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/xfs_fs.h:193:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char uuid[16]; /* unique id of the filesystem */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/xfs_fs.h:300:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char bs_pad[10]; /* pad space, unused */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/xfs_sb.h:128:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sb_fname[12]; /* file system name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/fat.h:27:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bsOemName[8]; /* Formatting program */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/fat.h:47:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bsVolumeLabel[11]; /* Volume name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/fat.h:48:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bsFileSysType[8]; /* File system type */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/fat.h:61:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bpb_reserved[12]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/fat.h:68:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bsVolumeLabel[11]; /* Volume name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/fat.h:69:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bsFileSysType[8]; /* File system type */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/libfat.h:35:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char entry[32]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/libfatint.h:28:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[LIBFAT_SECTOR_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/searchdir.c:45:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(direntry->entry, dep, sizeof(*dep)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/advio.c:59:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(file, O_RDONLY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/advio.c:97:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char advtmp[2 * ADV_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/advio.c:112:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(file, O_RDONLY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/advio.c:132:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(file, O_RDWR | O_SYNC); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/ext2fs/ext2_fs.h:586:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_volume_name[16]; /* volume name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/ext2fs/ext2_fs.h:587:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_last_mounted[64]; /* directory where last mounted */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/ext2fs/ext2_fs.h:765:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[EXT2_NAME_LEN]; /* File name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/ext2fs/ext2_fs.h:779:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[EXT2_NAME_LEN]; /* File name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/ext2fs/ext2_fs.h:834:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mmp_nodename[64]; /* Node which last updated MMP block */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/ext2fs/ext2_fs.h:835:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mmp_bdevname[32]; /* Bdev which last updated MMP block */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/fs.c:41:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bootsect->FAT_bsHead, &sbs->FAT_bsHead, FAT_bsHeadLen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/fs.c:42:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bootsect->FAT_bsCode, &sbs->FAT_bsCode, FAT_bsCodeLen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/fs.c:48:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bootsect->NTFS_bsHead, &sbs->NTFS_bsHead, NTFS_bsHeadLen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/fs.c:49:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bootsect->NTFS_bsCode, &sbs->NTFS_bsCode, NTFS_bsCodeLen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/fs.c:109:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fserr + 17, §buf->bs16.FileSysType, 8); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/getopt/getopt_long.c:127:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. optarg = (char *)argv[optind+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/linux/loop.h:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lo_name[LO_NAME_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/linux/loop.h:46:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char lo_encrypt_key[LO_KEY_SIZE]; /* ioctl w/o */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/linux/loop.h:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reserved[4]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/setadv.c:35:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char syslinux_adv[2 * ADV_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/setadv.c:56:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(advbuf + ADV_SIZE, advbuf, ADV_SIZE); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/setadv.c:77:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, syslinux_adv + 2 * 4, left); /* Make working copy */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/setadv.c:115:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, data, size); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/setadv.c:123:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(syslinux_adv + 2 * 4, advtmp, ADV_LEN); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/setadv.c:159:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(advbuf + ADV_SIZE, advbuf, ADV_SIZE); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/setadv.c:162:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(advbuf, advbuf + ADV_SIZE, ADV_SIZE); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/setadv.h:8:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern unsigned char syslinux_adv[2 * ADV_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxcom.c:239:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxint.h:179:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void _force *)dst, src, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxint.h:183:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, (const void _force *)src, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxint.h:232:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bsOemName[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxint.h:254:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char VolumeLabel[11]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxint.h:255:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char FileSysType[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxint.h:271:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char VolumeLabel[11]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxint.h:272:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char FileSysType[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxint.h:286:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bsOemName[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:126:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). loop_fd = open(devfdname, O_RDWR); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:157:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char devfdname[128], mnt_opts[128]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:246:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(name, O_RDONLY)) >= 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:253:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(name, O_WRONLY | O_CREAT | O_TRUNC, 0444); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:262:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char sectbuf[SECTOR_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:266:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mntname[128]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:303:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dev_fd = open(opt.device, O_RDWR); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzodefs.h:1682:73: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. # define __lzo_byte_struct(s,n) __lzo_struct_packed(s) unsigned char a[n]; __lzo_struct_packed_end() data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzodefs.h:1683:76: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. # define __lzo_byte_struct_ma(s,n) __lzo_struct_packed_ma(s) unsigned char a[n]; __lzo_struct_packed_ma_end() data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzodefs.h:1685:61: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. # define __lzo_byte_struct(s,n) struct s { unsigned char a[n]; } __attribute__((__packed__)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/include/lzo/lzodefs.h:1686:61: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. # define __lzo_byte_struct_ma(s,n) struct s { unsigned char a[n]; } __lzo_may_alias __attribute__((__packed__)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/prepcore.c:217:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(in_name, "rb"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/prepcore.c:350:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(out_name, "wb"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_conf.h:139:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # undef memcpy data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_conf.h:140:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy(a,b,c) lzo_memcpy(a,b,c) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_conf.h:143:33: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define lzo_memcpy(a,b,c) memcpy(a,b,c) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_func.h:186:41: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. struct lzo_memops_TU2_struct { unsigned char a[2]; } __lzo_may_alias; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_func.h:201:41: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. struct lzo_memops_TU4_struct { unsigned char a[4]; } __lzo_may_alias; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_func.h:216:41: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. struct lzo_memops_TU8_struct { unsigned char a[8]; } __lzo_may_alias; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_init.c:70:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char b[2*LZO_MAX(8,sizeof(lzo_uint))]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:1123:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char f_name[LZO_FN_NAME_MAX+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:1129:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char f_name[LZO_FN_NAME_MAX+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:1131:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char u_dta[21]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:1137:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char f_name[LZO_FN_NAME_MAX+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:1141:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char f_name[LZO_FN_NAME_MAX+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:2071:12: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. return memcpy(dest, src, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:2713:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tmp[512]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:2753:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tmp[512]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:3799:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char f_name[ACC_FN_NAME_MAX+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:3805:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char f_name[ACC_FN_NAME_MAX+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:3807:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char u_dta[21]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:3813:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char f_name[ACC_FN_NAME_MAX+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:3817:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char f_name[ACC_FN_NAME_MAX+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:4997:12: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. return memcpy(dest, src, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:5434:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tmp[512]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:5474:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tmp[512]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/acpi.h:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char signature[4]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/acpi.h:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oem_id[6]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/acpi.h:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oem_table_id[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/acpi.h:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char asl_compiler_id[4]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/conio.c:112:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c, sign, tmp[66]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/conio.c:362:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char printf_buf[2048]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/e820test.c:50:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[BUFSIZ], *p; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/inflate.c:566:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(slide + w, slide + d, e); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/memcpy.c:8:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. void *memcpy(void *dst, const void *src, size_t n) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/memdisk.h:51:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdline[0x1f1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/memdisk.h:60:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[4]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/memdisk.h:83:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. void *memcpy(void *, const void *, size_t); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/memdisk.h:103:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(__d, __s, __n); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/setup.c:267:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bs_vollab[11]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/setup.c:268:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bs_filsystype[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/setup.c:272:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bs_oemname[8]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/setup.c:296:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bpb_reserved[12]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/setup.c:409:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dosemu, (char *)where + hd_geometry.offset, sizeof dosemu); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/setup.c:785:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rm_args, rm_args_ptr, sizeof rm_args); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/setup.c:1220:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)boot_base, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/unzip.c:352:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char heap[65536]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:74:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char target_file[4096], command[5120]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:80:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. cp += sprintf(cp, "'s:/"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:132:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char sectbuf[SECTOR_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:185:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dev_fd = open(opt.device, O_RDWR); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/mtools/syslinux.c:214:14: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). mtc_fd = mkstemp(mtools_conf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:66:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mbr_template_path[1024] = {0}; /* Path to MBR template */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:200:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; /* partition name */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:201:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[32]; /* string type description */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:212:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char processor[16]; /* Contains 680x0, x=0,2,3,4; or empty */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:214:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _padding[372]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:504:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&de_boot, buf++, 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:505:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&de_media, buf++, 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:507:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&de_seg, buf, 2); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:511:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&de_sys, buf++, 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:512:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&de_mbz1, buf++, 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:514:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&de_count, buf, 2); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:518:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&de_lba, buf, 4); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:522:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&de_mbz2, buf, 2); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:541:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&header_indicator, buf++, 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:542:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&platform_id, buf++, 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:544:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&count, buf, 2); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:559:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(count, buf, 2); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:563:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lba, buf, 4); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:591:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(path, "rb"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:625:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mbr, &isohdpfx[hd0 + 3 * partok], MBRSIZE); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:632:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mbr, afp_header, sizeof(afp_header)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:644:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mbr, &tmp, sizeof(tmp)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:648:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mbr, &tmp, sizeof(tmp)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:652:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mbr, &tmp, sizeof(tmp)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:688:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mbr[8], &tmp, sizeof(tmp)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:691:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mbr[12], &tmp, sizeof(tmp)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:705:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mbr[8], &tmp, sizeof(tmp)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:708:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mbr[12], &tmp, sizeof(tmp)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:722:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mbr[8], &tmp, sizeof(tmp)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:725:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mbr[12], &tmp, sizeof(tmp)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:836:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(header->diskGUID, disk_uuid, sizeof(uuid_t)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:851:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(part->partGUID, iso_uuid, sizeof(uuid_t)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:852:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(part->partTypeGUID, basic_partition, sizeof(uuid_t)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:860:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(part->partGUID, part_uuid, sizeof(uuid_t)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:861:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(part->partTypeGUID, basic_partition, sizeof(uuid_t)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:873:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(part->partGUID, part_uuid, sizeof(uuid_t)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:874:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(part->partTypeGUID, hfs_partition, sizeof(uuid_t)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:900:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(part->name, "Apple"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:901:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(part->type, "Apple_partition_map"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:912:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(part->name, "EFI"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:913:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(part->type, "Apple_HFS"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:926:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(part->name, "EFI"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:927:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(part->type, "Apple_HFS"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:936:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(part->name, "ISO"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:937:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(part->type, "Apple_Free"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:970:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(fp = fopen(argv[0], "rb+"))) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/memdiskfind.c:74:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txtline[256], user[256]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/memdiskfind.c:79:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). iomem = fopen("/proc/iomem", "r"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/memdiskfind.c:123:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). memfd = open("/dev/mem", O_RDONLY); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/win/syslinux.c:96:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char driveName[128]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/win/syslinux.c:98:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(driveName, "\\\\.\\PHYSICALDRIVE%d", driveNum); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/win/syslinux.c:111:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char sector[SECTOR_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/win/syslinux.c:139:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sector, syslinux_mbr, syslinux_mbr_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/win/syslinux.c:241:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char new_name[strlen(opt.directory) + 16]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/win/syslinux.c:270:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, filename, 12); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/win/syslinux.c:298:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char sectbuf[SECTOR_SIZE]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/mangle.c:214:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(opt.grubcfg) >= sizeof stage2->config_file) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/utility.c:63:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). cnt = read(0, &junk, 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/chain/utility.c:69:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). cnt = read(0, &junk, 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/complex.c:172:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(infoline, " "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/des.c:1001:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(output, setting, 9); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/des.c:1011:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = (my_u_char_t *) output + strlen(output); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/help.c:138:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gotoxy(1, (nc - strlen(title)) / 2); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/help.c:206:2: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(fullname, "/"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:125:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tpos = (ms->numcols - strlen(ms->title) - 1) >> 1; // center it on line data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:294:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = (menuwidth - strlen(menu->title) - 1) >> 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:630:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (mi->data && strlen(mi->data) > 0 && data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1042:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(title) > MENULEN - 2) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1048:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). m->menuwidth = strlen(m->title); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1065:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). m->name = (char *)malloc(strlen(name) + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1131:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(item) > MENULEN) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1136:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(mi->item) > m->menuwidth) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1137:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). m->menuwidth = strlen(mi->item); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1142:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(status) > STATLEN) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1176:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(data) > ACTIONLEN) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/menu.c:1257:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(line, " "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.c:56:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dperm = (char *)malloc(strlen(perm) + 3); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.c:59:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dperm[strlen(perm) + 1] = ':'; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.c:60:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dperm[strlen(perm) + 2] = 0; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.c:139:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). userdb[numusers]->perms = (char *)malloc(strlen(perms) + 3); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.c:142:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (userdb[numusers]->perms)[strlen(perms) + 1] = ':'; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/passwords.c:143:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (userdb[numusers]->perms)[strlen(perms) + 2] = 0; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/syslnx.c:27:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bounce = lmalloc(strlen(cmd) + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/cmenu/libmenu/tui.c:57:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = str + strlen(str); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/cli.c:178:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = strlen(input); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/cli.c:193:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dy = y - (cursor + strlen(input) + 1) / width; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/cli.c:194:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = (cursor + strlen(input) + 1) % width; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/cli.c:359:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cursor = len = strlen(cmdline); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/cli.c:381:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cursor = len = strlen(cmdline); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/cli.c:395:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmdline); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/cli.c:465:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(ret); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/execute.c:59:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(cmdline) >= MAX_CMDLINE_LEN) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/kernel.c:38:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cmdline_len = strlen("BOOT_IMAGE=") + strlen(kernel_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/kernel.c:38:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cmdline_len = strlen("BOOT_IMAGE=") + strlen(kernel_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/kernel.c:40:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cmdline_len += strlen(args); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c:61:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int elen = strlen(ext->name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c:86:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int elen = strlen(ext->name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c:91:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str, kernel, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c:92:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str + len, ext->name, elen); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c:110:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(kernel); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c:111:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int elen = strlen(ext); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c:133:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). k[len + strlen(p)] = '\0'; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c:161:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(me->cmdline) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c:168:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(args)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c:169:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(args) + 1; /* +1 for space (' ') */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c:175:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(args)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c:178:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(cmd, me->cmdline, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/ldlinux.c:246:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(ConfigName)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/msg.c:41:15: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((ch = getc(f)) != EOF) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:120:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t __n = strlen(__x) + 1; \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:162:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r = q = refstr_alloc(strlen(str) - carets); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:954:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). onerrorlen = strlen(m->onerror); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1118:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = ld.helptext ? strlen(ld.helptext) : 0; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1131:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xlen = strlen(line); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1209:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ontimeoutlen = strlen(ontimeout); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1300:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). onerrorlen = strlen(m->onerror); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/readconfig.c:1425:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen("sendcookies"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/ldlinux/refstr.c:60:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/test_com32.c:72:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (crt_arg != NULL && strlen(crt_arg) > 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/elflink/test_com32.c:105:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(crt_lib) > 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:270:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while((c = getc(f)) != EOF) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:291:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int i = strlen(s); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:354:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). u = strlen(t); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:364:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). u = strlen(t); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:391:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). u = strlen(t); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:414:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). u = strlen(t); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:780:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). i = read(fd, buf + cur, min(CHUNK_SIZE, size - cur)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:788:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). i = read(fd, buf + size, CHUNK_SIZE); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:839:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). label_len = strlen(menu_ptr->label); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:840:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). menu_label_len = strlen(menu_ptr->menu_label); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gfxboot/gfxboot.c:863:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(arg + strlen(arg), " %s", ipappend->ptr[i]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gplinclude/zzjson/zzjson.h:34:11: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int (*getchar)(void *ihandle); // pa data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:44:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(buffer, " edge", 5); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:46:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(buffer, " level", 6); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/acpi/acpi.c:48:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(buffer, " default", 8); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:470:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bp += strlen(bp); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/dmi/dmi.c:479:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(bp); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/zzjson/zzjson_create.c:55:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t slen = strlen(s)+1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/zzjson/zzjson_parse.c:12:33: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define GETC() config->getchar(config->ihandle) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/zzjson/zzjson_parse.c:240:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char b[strlen(s)+1]; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/gpllib/zzjson/zzjson_parse.c:243:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i=0; i<strlen(s); i++) b[i] = GETC(); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-cpu.c:85:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((((strlen(buffer) + strlen(flag_name)) > 66) && flag) || flush) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-cpu.c:85:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((((strlen(buffer) + strlen(flag_name)) > 66) && flag) || flush) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:73:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->dmi.oem_strings)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:106:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->dmi.base_board.devices_information[i].type)) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:140:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->dmi.system.configuration_options)) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:153:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->dmi.system.system_reset.boot_option)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:156:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->dmi.system.system_reset.boot_option_on_limit)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:159:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->dmi.system.system_reset.reset_count)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:162:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->dmi.system.system_reset.reset_limit)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:165:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->dmi.system.system_reset.timer_interval)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:168:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->dmi.system.system_reset.timeout)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:192:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->dmi.bios.firmware_revision)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-dmi.c:593:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->dmi.oem_strings)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-hdt.c:308:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(text_to_say, " "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c:64:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(kernel_modules, " | ", 3); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c:75:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat(buffer, "(", 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c:78:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat(buffer, ")", 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c:79:6: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(buffer, " # ", 3); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c:84:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat(buffer, "\n", 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c:117:6: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat(kernel_modules, " ", 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-kernel.c:131:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(category_name[i]) > 1) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-pci.c:102:6: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(kernel_modules, " | ", 3); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-pci.c:182:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(kernel_modules, " | ", 3); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-vpd.c:46:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->vpd.bios_build_id) > 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-vpd.c:49:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->vpd.bios_release_date) > 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-vpd.c:52:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->vpd.bios_version) > 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-vpd.c:55:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->vpd.default_flash_filename) > 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-vpd.c:58:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->vpd.box_serial_number) > 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-vpd.c:61:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->vpd.motherboard_serial_number) > 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli-vpd.c:64:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->vpd.machine_type_model) > 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:393:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *argv[argc_iter] = malloc(strlen(pch) * sizeof(char)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:394:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlcpy(*argv[argc_iter], pch, strlen(pch)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:454:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(CLI_SHOW, command, strlen(command)) == 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:458:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(CLI_SET, command, strlen(command)) == 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:468:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(list_modes[j]->name, command, strlen(command)) == 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:483:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). command, strlen(command)) == 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:518:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(command)) == 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:542:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(CLI_SHOW, command, strlen(command)) == 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:548:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). module, strlen(module)) == 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:556:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (strncmp(CLI_SET, command, strlen(command)) == 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:563:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). module, strlen(module)) == 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:654:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new_argv[argc_iter+1] = malloc(strlen(argv[argc_iter])); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:655:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlcpy(new_argv[argc_iter+1], argv[argc_iter], strlen(argv[argc_iter])); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:658:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new_argv[0] = malloc(strlen(module)*sizeof(char)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:659:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlcpy(new_argv[0], module, strlen(module)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:771:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(remove_spaces(mypch)) > 0) && data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:812:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hdt_cli.history[i]) == 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:842:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->auto_label) > 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:875:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(INPUT) - hdt_cli.cursor_pos); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:891:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (hdt_cli.cursor_pos < (int)strlen(INPUT)) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:901:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(INPUT) - hdt_cli.cursor_pos) > 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:903:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). move_cursor_right(strlen(INPUT) - hdt_cli.cursor_pos); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:904:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hdt_cli.cursor_pos = strlen(INPUT); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:932:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hdt_cli.history[future_history_pos]) == 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:950:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hdt_cli.cursor_pos = strlen(INPUT); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:966:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hdt_cli.history[future_history_pos]) == 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:991:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hdt_cli.cursor_pos = strlen(INPUT); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1004:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hdt_cli.cursor_pos = strlen(INPUT); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1021:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(remove_spaces(INPUT)) < 1) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1036:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(INPUT) > 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1050:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(INPUT) == 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1053:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (hdt_cli.cursor_pos >= strlen(INPUT)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1056:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int c = hdt_cli.cursor_pos; c < (int)strlen(INPUT) - 1; c++) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1058:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). INPUT[strlen(INPUT) - 1] = '\0'; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1067:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(INPUT + hdt_cli.cursor_pos) > 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1068:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). move_cursor_left(strlen(INPUT + hdt_cli.cursor_pos)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1078:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). c < (int)strlen(INPUT) - 1; c++) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1080:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). INPUT[strlen(INPUT) - 1] = '\0'; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1093:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). move_cursor_to_column(strlen(hdt_cli.prompt) + hdt_cli.cursor_pos + data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1111:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (hdt_cli.cursor_pos < (int)strlen(INPUT)) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1113:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int trailing_chars = strlen(INPUT) - hdt_cli.cursor_pos; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1117:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(temp_command, key, 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-cli.c:1118:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(temp_command, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:52:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(dot) <= 4) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:139:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(hardware->postexec, " "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:143:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hardware->postexec[strlen(hardware->postexec) - 1] = 0; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:161:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(hardware->auto_label, " "); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:165:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hardware->auto_label[strlen(hardware->auto_label) - 1] = 0; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:606:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(remove_spaces(hardware->cpu.model)) == 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:627:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int la = strlen(argument); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:665:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen(p) - 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:682:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen(p) - 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-common.c:709:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlcpy(p, p + 1, strlen(p + 1)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:50:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->dmi.oem_strings) == 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-dmi.c:408:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->dmi.base_board.devices_information[i].type)) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump-pci.c:82:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(kernel_modules, " | ", 3); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump.c:102:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(option, buffer, buffer_end - buffer + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump.c:173:19: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (int (*)(void *))fgetc, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-dump.c:194:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->tftp_ip) != 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-kernel.c:63:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(kernel_modules, " | ", 3); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-kernel.c:70:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(kernel_modules) > 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-pci.c:107:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(kernel_modules, " | ", 3); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-pci.c:162:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(kernel_modules, " | ", 3); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-processor.c:36:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((((strlen(buffer) + strlen(flag_name)) > 35) && flag) || flush) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-processor.c:36:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((((strlen(buffer) + strlen(flag_name)) > 35) && flag) || flush) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:173:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(kernel_modules, " | ", 3); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-summary.c:180:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(kernel_modules) > 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-vpd.c:50:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->vpd.bios_build_id) > 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-vpd.c:59:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->vpd.bios_release_date) > 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-vpd.c:68:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->vpd.bios_version) > 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-vpd.c:77:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->vpd.default_flash_filename) > 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-vpd.c:86:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->vpd.box_serial_number) > 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-vpd.c:95:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->vpd.motherboard_serial_number) > 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt-menu-vpd.c:104:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware->vpd.machine_type_model) > 0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/hdt/hdt.c:88:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hardware.postexec)>0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/gzguts.h:48:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). # define read _read data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdio.h:66:14: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). __extern int fgetc(FILE *); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdio.h:68:9: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define getc(f) fgetc(f) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/stdio.h:68:17: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define getc(f) fgetc(f) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/string.h:30:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __extern size_t strlen(const char *); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/string.h:32:16: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. __extern char *strncat(char *, const char *, size_t); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/string.h:35:16: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). __extern char *strncpy(char *, const char *, size_t); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/syslinux/firmware.h:22:9: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). char (*getchar)(char *); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/include/unistd.h:18:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). __extern ssize_t read(int, void *, size_t); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fgetc.c:14:5: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int fgetc(FILE * f) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fgets.c:17:7: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ch = getc(f); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fputs.c:14:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return _fwrite(s, strlen(s), file); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/fread.c:16:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rv = read(fileno(f), p, count); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/getopt.c:54:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((uintptr_t) (pvt.optptr - carg) > (uintptr_t) strlen(carg)) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/getopt_long.c:109:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((uintptr_t) (pvt.optptr - carg) > (uintptr_t) strlen(carg)) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngrutil.c:2586:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_info.text_length = strlen(text); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:325:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(purpose) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:350:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). !png_check_fp_string(params[i], strlen(params[i]))) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:376:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(units) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:407:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(params[i]) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:446:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (swidth == NULL || (lengthw = strlen(swidth)) == 0 || data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:450:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (sheight == NULL || (lengthh = strlen(sheight)) == 0 || data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:725:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(name)+1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:851:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key_len = strlen(text_ptr[i].key); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:865:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lang_len = strlen(text_ptr[i].lang); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:871:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lang_key_len = strlen(text_ptr[i].lang_key); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:898:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_length = strlen(text_ptr[i].text); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngset.c:1117:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(entries->name) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngtest.c:1353:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(tIME_string, "*** invalid time ***", (sizeof tIME_string)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngtest.c:1589:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(tIME_string, "*** invalid time ***", sizeof tIME_string); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwutil.c:1547:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_len = strlen(text); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwutil.c:1602:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text == NULL ? 0 : strlen(text)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwutil.c:1670:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lang_len = strlen(lang)+1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwutil.c:1672:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lang_key_len = strlen(lang_key)+1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwutil.c:1686:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). png_text_compress_init(&comp, (png_const_bytep)text, strlen(text)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwutil.c:1768:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). units_len = strlen(units) + (nparams == 0 ? 0 : 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwutil.c:1780:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). params_len[i] = strlen(params[i]) + (i == nparams - 1 ? 0 : 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwutil.c:1817:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wlen = strlen(width); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/libpng/pngwutil.c:1818:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hlen = strlen(height); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/lstrdup.c:11:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(s) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:51:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int j = strlen(string); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:89:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(dev->dev_info->linux_kernel_module[i])==0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:118:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(result)>1) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:618:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(dev->dev_info->linux_kernel_module[i])==0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:652:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result = strtok(line+strlen("alias pci:v"), delims); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:660:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result+=strlen(vendor_id)+1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:667:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result+=strlen(product_id)+1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:674:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result+=strlen(sub_vendor_id)+1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:681:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result+=strlen(sub_product_id)+1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:684:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if ((strlen(result)>2) && data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/pci/scan.c:688:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). module_name[strlen(module_name)-1]='\0'; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strdup.c:10:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(s) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strlen.c:7:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t strlen(const char *s) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strncat.c:7:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. char *strncat(char *dst, const char *src, size_t n) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strncat.c:9:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(strchr(dst, '\0'), src, n); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strncpy.c:9:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). char *strncpy(char *dst, const char *src, size_t n) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strndup.c:10:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = n > strlen(s) ? strlen(s) + 1 : n + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strndup.c:10:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = n > strlen(s) ? strlen(s) + 1 : n + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strreplace.c:44:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(string); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strreplace.c:45:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). srlen = strlen(string_to_replace); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strreplace.c:46:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). silen = strlen(string_to_insert); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strstr.c:9:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (char *)memmem(haystack, strlen(haystack), needle, strlen(needle)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/strstr.c:9:63: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (char *)memmem(haystack, strlen(haystack), needle, strlen(needle)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/file.h:60:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ssize_t (*read)(struct file_info *, void *, size_t); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/common.c:74:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (entry->str[strlen(entry->str) - 1] != '/') data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/common.c:188:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(result->name, name, MODULE_NAME_SIZE); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/elf_module.c:239:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(dep)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/module/exec.c:95:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(*arg)+1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/rawcon_read.c:65:10: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). *bufp = getchar(&hi); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/read.c:41:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ssize_t read(int fd, void *buf, size_t count) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/read.c:50:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return fp->iop->read(fp, buf, count); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/i915resolution.c:343:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (memmem(map->bios_ptr, VBIOS_SIZE, ATI_SIGNATURE1, strlen(ATI_SIGNATURE1)) || data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/i915resolution.c:344:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmem(map->bios_ptr, VBIOS_SIZE, ATI_SIGNATURE2, strlen(ATI_SIGNATURE2)) ) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/i915resolution.c:353:61: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (memmem(map->bios_ptr, VBIOS_SIZE, NVIDIA_SIGNATURE, strlen(NVIDIA_SIGNATURE))) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/sys/vesa/i915resolution.c:362:88: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (map->chipset == CT_UNKWN && memmem(map->bios_ptr, VBIOS_SIZE, INTEL_SIGNATURE, strlen(INTEL_SIGNATURE))) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/initramfs_file.c:110:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int namelen = strlen(filename); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/load_linux.c:71:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t la = strlen(argument); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/load_linux.c:173:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cmdline_size = strlen(cmdline) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/runimage.c:48:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(filename) + strlen(cmdline) + 2; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/syslinux/runimage.c:48:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(filename) + strlen(cmdline) + 2; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vsnprintf.c:386:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(sarg); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lib/vsscanf.c:164:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strncasecmp(q, *np, strlen(*np))) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libupload/cpio.c:29:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nlen = strlen(filename)+1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/ansiraw.c:96:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rv = read(fd, buf, count); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/base64.c:85:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(argv[i]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/crypt-md5.c:59:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int pwlen = strlen(pw); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:331:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key_len = strlen(key); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:532:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(salt) + 1 + 43 + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha256crypt.c:633:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sha256_process_bytes(tests[cnt].input, strlen(tests[cnt].input), &ctx); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:366:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key_len = strlen(key); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:579:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(salt) + 1 + 86 + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/libutil/sha512crypt.c:700:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sha512_process_bytes(tests[cnt].input, strlen(tests[cnt].input), &ctx); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lauxlib.c:368:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *len = (def ? strlen(def) : 0); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lauxlib.c:467:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). luaL_addlstring(B, s, strlen(s)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lauxlib.c:601:9: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(lf->f); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lauxlib.c:606:10: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return getc(lf->f); /* return next character */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lauxlib.c:621:11: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(lf->f); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lauxlib.c:623:11: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). *cp = getc(lf->f); /* skip end-of-line, if present */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lauxlib.c:694:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return luaL_loadbuffer(L, s, strlen(s), s); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lauxlib.c:775:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (e == NULL) e = fname + strlen(fname); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lauxlib.c:907:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(p); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/ldblib.c:351:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (luaL_loadbuffer(L, buffer, strlen(buffer), "=(debug command)") || data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/liolib.c:270:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). luaL_error(L, "standard %s file is closed", findex + strlen(IO_PREFIX)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/liolib.c:367:11: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int c = getc(f); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/liolib.c:391:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(p); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loadlib.c:392:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (l == NULL) l = path + strlen(path); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/loadlib.c:684:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int need_slash = e[strlen(e)-1] != '/'; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lobject.c:190:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pushstr(L, s, strlen(s)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lobject.c:227:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pushstr(L, fmt, strlen(fmt)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lobject.c:253:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(source); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstring.c:171:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return luaS_newlstr(L, str, strlen(str)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:571:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). upto += strlen(p + upto) + 1; /* may have more after \0 */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:883:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(form); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lstrlib.c:884:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t lm = strlen(lenmod); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lua.c:194:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). luai_writestring(LUA_COPYRIGHT, strlen(LUA_COPYRIGHT)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lua.c:225:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int status = luaL_loadbuffer(L, s, strlen(s), name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lua.c:276:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(b); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/lvm.c:241:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(l); /* index of first `\0' in both strings */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/pci.c:16:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int j = strlen(string); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/syslinux.c:65:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int la = strlen(argument); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/syslinux.c:86:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bytes += strlen(*arg) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/syslinux.c:94:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(*arg); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/syslinux.c:152:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). newcmdline = malloc(strlen(kernel) + 12); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/lua/src/syslinux.c:157:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strcpy(newcmdline + strlen(newcmdline), kernel); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/mboot/map.c:77:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return map_data(string, strlen(string) + 1, 1, 0); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/mboot/mboot.c:130:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). arglen += strlen(*argx) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/drain.c:14:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rv = read(0, (char *)&junk, 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/menumain.c:81:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(text); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/menumain.c:234:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). PASSWD_ROW, (WIDTH - (strlen(cm->messages[MSG_PASSPROMPT]) + 2)) / 2, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/menumain.c:342:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tabmsg_len = strlen(tabmsg); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/menumain.c:455:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = cursor = strlen(cmdline); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/menumain.c:938:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). syslinux_setadv(ADV_MENUSAVE, strlen(me->label), me->label); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/passwd.c:38:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SHA1Update(&d.ctx, (void *)entry, strlen(entry)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/passwd.c:53:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(crypted); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/passwd.c:62:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(crypted); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/passwd.c:71:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(crypted); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/printmsg.c:52:26: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (!eof && (ch = getc(f)) != EOF) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:59:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t __n = strlen(__x) + 1; \ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:117:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r = q = refstr_alloc(strlen(str) - carets); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:942:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = ld.helptext ? strlen(ld.helptext) : 0; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/readconfig.c:955:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xlen = strlen(line); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/menu/refstr.c:59:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/elf.c:175:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). argsize += strlen(*argp) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/elf.c:210:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int bytes = strlen(*argp) + 1; /* Including final null */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/hexdump.c:177:6: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). i = fgetc(stdin); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/hexdump.c:188:6: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). i = fgetc(stdin); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ifcpu.c:71:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(*pp) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ifcpu64.c:82:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(*pp) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ifmemdsk.c:345:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(*pp) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/ifplop.c:123:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(*pp) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/kontron_wdt.c:408:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(default_label)>0) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/linux.c:65:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int la = strlen(argument); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/linux.c:81:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int la = strlen(argument); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/linux.c:120:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bytes += strlen(*arg) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/linux.c:128:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(*arg); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/linux.c:290:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). boot_image = malloc(strlen(kernel_name) + 12); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pcitest.c:75:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(kernel_modules, " | ", 3); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pmload.c:109:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). argsize += strlen(*argp) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pmload.c:144:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int bytes = strlen(*argp) + 1; /* Including final null */ data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c:393:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hlen = hostlen_limit(strlen(csep + 3)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/pxechn.c:688:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). iopt->len = strlen(pos); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/vpdtest.c:50:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(vpd.bios_build_id) > 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/vpdtest.c:52:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(vpd.bios_release_date) > 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/vpdtest.c:54:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(vpd.bios_version) > 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/vpdtest.c:56:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(vpd.default_flash_filename) > 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/vpdtest.c:59:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(vpd.box_serial_number) > 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/vpdtest.c:61:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(vpd.motherboard_serial_number) > 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/vpdtest.c:64:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(vpd.machine_type_model) > 0) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/whichsys.c:47:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(*pp) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/modules/zzjson.c:35:46: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (int(*)(void*)) fgetc, data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:125:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). epos = strlen(src); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:147:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(istr); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:343:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). arglen = strlen(argv[i]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:413:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filepos = strlen(pwdstr); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:562:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). file2pos = strlen(filestr); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:592:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). file2pos = strlen(filestr); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.c:1147:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tlen = strlen(argv[0]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.h:110:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dest, slv->version_string, n); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.h:131:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dest, env.sysname, n); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.h:132:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(dest); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.h:133:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant character. strncpy(dest + len, " ", (n - len)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.h:134:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(dest); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/rosh/rosh.h:135:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dest + len, env.release, (n - len)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/com32/samples/keytest.c:58:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). key = getc(stdin); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/conio.c:308:15: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). __export char getchar(char *hi) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/conio.c:310:26: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return firmware->i_ops->getchar(hi); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/conio.c:315:19: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). regs->eax.b[0] = getchar((char *)®s->eax.b[1]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/dmi.c:289:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pfxlen = strlen(pfx); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/elflink/load_env32.c:115:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). argsmem += strlen(argv[i]) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/elflink/load_env32.c:145:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen(p) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/elflink/load_env32.c:180:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(CurrentDirName) && !path_add(CurrentDirName)) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/elflink/load_env32.c:280:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(argv[i], start, len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/btrfs/btrfs.c:478:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). search_key.offset = btrfs_name_hash(name, strlen(name)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ext2/ext2.c:102:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t dname_len = strlen(dname); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fat/fat.c:457:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slots = (strlen(dname) + 12) / 13; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/fs.c:267:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new_len += strlen(next_inode_name) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/getcwd.c:8:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((buf != NULL) && (strlen(this_fs->cwd_name) < size)) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/iso9660/susp_rr.c:418:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *len_name = strlen(*name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/lib/searchconfig.c:29:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sd, (*sd && sd[strlen(sd)-1] == '/') ? "" : "/", data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/ntfs/ntfs.c:306:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(dname) != entry_fn_len) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/ftp_readdir.c:127:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/pxe.c:366:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(path_prefix); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/pxe/tftp.c:44:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = min(strlen(errstr), sizeof(err_buf.err_msg)-1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_dir2.c:420:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hashwant = xfs_dir2_da_hashname((uint8_t *)dname, strlen(dname)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_dir2.c:678:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hashwant = xfs_dir2_da_hashname((uint8_t *)dname, strlen(dname)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/fs/xfs/xfs_dir2.h:59:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!name || (strlen(name) != end - start)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/graphics.c:120:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). char data = getc(fd); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/graphics.c:127:9: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). data = getc(fd); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/graphics.c:255:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). *p = getc(fd); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/include/core.h:132:13: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). extern char getchar(char *hi); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/api/netdb.c:189:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namelen = strlen(name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/api/netdb.c:307:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namelen = strlen(nodename); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/dhcp.c:300:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). u8_t namelen = (u8_t)strlen(p); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/dhcp.c:1030:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). u8_t namelen = (u8_t)strlen(p); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/dhcp.c:1093:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). u8_t namelen = (u8_t)strlen(p); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/dns.c:329:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namelen = strlen(init_entry->name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/dns.c:424:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namelen = strlen(hostname); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/dns.c:910:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namelen = LWIP_MIN(strlen(name), DNS_MAX_NAME_LENGTH-1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/dns.c:949:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (strlen(hostname) >= DNS_MAX_NAME_LENGTH)) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/core/pbuf.c:1151:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). substr_len = strlen(substr); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/include/lwip/sockets.h:363:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define read(a,b,c) lwip_read(a,b,c) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ethernetif.c:196:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read data into(q->payload, q->len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ethernetif.c:198:38: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). acknowledge that packet has been read(); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:313:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(user); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:316:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(passwd); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:358:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(addr); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:896:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *msglen = strlen(*msg); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:920:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *msglen = strlen(*msg); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:1090:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = (int)strlen(ppp_settings.passwd); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/auth.c:1117:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(secbuf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/chap.c:466:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(rhostname, ppp_settings.remote_name, sizeof(rhostname)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/chap.c:717:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_len = (int)strlen(cstate->chal_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/chap.c:757:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). msglen = (int)strlen(msg); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/chap.c:817:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_len = (int)strlen(cstate->resp_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/fsm.c:278:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). f->term_reason_len = (reason == NULL ? 0 : (int)strlen(reason)); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/lcp.c:1306:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). traceNdx = strlen(traceBuf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/lcp.c:1339:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). traceNdx = strlen(traceBuf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/lcp.c:1391:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). traceNdx = strlen(traceBuf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/lcp.c:1429:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). traceNdx = strlen(traceBuf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/lcp.c:1460:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). traceNdx = strlen(traceBuf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/lcp.c:1492:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). traceNdx = strlen(traceBuf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/lcp.c:1515:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). traceNdx = strlen(traceBuf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/lcp.c:1528:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). traceNdx = strlen(traceBuf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/lcp.c:1541:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). traceNdx = strlen(traceBuf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/lcp.c:1549:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). traceNdx = strlen(traceBuf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/lcp.c:1557:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). traceNdx = strlen(traceBuf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/lcp.c:1565:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). traceNdx = strlen(traceBuf); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/pap.c:169:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). u->us_userlen = (int)strlen(user); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/pap.c:171:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). u->us_passwdlen = (int)strlen(password); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp.c:504:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(ppp_settings.user, user, sizeof(ppp_settings.user)-1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp.c:511:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(ppp_settings.passwd, passwd, sizeof(ppp_settings.passwd)-1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp_oe.c:396:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pppoe_error_tmp, (char*)pb->payload + off + sizeof(pt), error_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp_oe.c:685:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l1 = (int)strlen(sc->sc_service_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp_oe.c:689:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l2 = (int)strlen(sc->sc_concentrator_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp_oe.c:905:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l1 = strlen(sc->sc_service_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/lwip/src/netif/ppp/ppp_oe.c:1027:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l1 = strlen(sc->sc_service_name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/core/path.c:24:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(str)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/dos/string.h:16:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static inline size_t strlen(const char *s) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/main.c:889:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). EFI_SIZE_TO_PAGES(strlen(str) + 1), data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/main.c:896:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(cmdline, str, strlen(str) + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/efi/main.c:1227:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(_cmdline) + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:572:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path, path[0] && path[strlen(path) - 1] == '/' ? "" : "/"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:574:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path, path[0] && path[strlen(path) - 1] == '/' ? "" : "/"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:576:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path, path[0] && path[strlen(path) - 1] == '/' ? "" : "/"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:688:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path, path[0] && path[strlen(path) - 1] == '/' ? "" : "/"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:733:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path[0] && path[strlen(path) - 1] == '/' ? "" : "/"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:735:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path[0] && path[strlen(path) - 1] == '/' ? "" : "/"); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:913:16: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dirname, name, name_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:1001:20: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(subvol, name, name_len); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:1198:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf = q = malloc(strlen(p) + 6); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/main.c:1332:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(name); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/mountinfo.c:35:7: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ch = getc(f); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/mountinfo.c:47:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ch = getc(f); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/mountinfo.c:173:11: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ec = getc(f); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/extlinux/mountinfo.c:219:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(real_path); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/cache.c:41:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (fs->read(fs->readptr, ls->data, LIBFAT_SECTOR_SIZE, n) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libfat/libfatint.h:38:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int (*read) (intptr_t, void *, size_t, libfat_sector_t); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/advio.c:52:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path[0] && path[strlen(path) - 1] == '/' ? "" : "/", cfg); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/advio.c:105:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path[0] && path[strlen(path) - 1] == '/' ? "" : "/", cfg); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/getopt/getopt_long.c:109:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((uintptr_t) (pvt.optptr - carg) > (uintptr_t) strlen(carg)) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxmod.c:177:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int sublen = strlen(subdir) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxmod.c:187:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int sublen = strlen(subvol) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxopt.c:260:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (syslinux_setadv(ADV_BOOTONCE, strlen(opt.set_once), opt.set_once)) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/libinstaller/syslxopt.c:267:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (syslinux_setadv(ADV_MENUSAVE, strlen(opt.menu_save), opt.menu_save)) { data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:278:5: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(077); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:283:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(opt.directory); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:393:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ldlinux_path = alloca(strlen(mntpath) + strlen(subdir) + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:393:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ldlinux_path = alloca(strlen(mntpath) + strlen(subdir) + 1); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/linux/syslinux.c:396:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ldlinux_name = alloca(strlen(ldlinux_path) + 14); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/lzo_supp.h:2809:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). errno = 0; n = read(fd, b, n); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/lzo/src/miniacc.h:5530:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). errno = 0; n = read(fd, b, n); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/memdisk.h:89:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static inline size_t strlen(const char *__a) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/memdisk/setup.c:999:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cmdline_len = strlen(shdr->cmdline) + 1; data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:355:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(optarg) >= sizeof(mbr_template_path)) data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/utils/isohybrid.c:954:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). prog = strcpy(alloca(strlen(argv[0]) + 1), argv[0]); data/syslinux-6.04~git20190206.bf6db5b4+dfsg1/win/syslinux.c:241:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char new_name[strlen(opt.directory) + 16]; ANALYSIS SUMMARY: Hits = 2697 Lines analyzed = 283323 in approximately 7.59 seconds (37339 lines/second) Physical Source Lines of Code (SLOC) = 190568 Hits@level = [0] 1786 [1] 486 [2] 1617 [3] 54 [4] 524 [5] 16 Hits@level+ = [0+] 4483 [1+] 2697 [2+] 2211 [3+] 594 [4+] 540 [5+] 16 Hits/KSLOC@level+ = [0+] 23.5244 [1+] 14.1524 [2+] 11.6022 [3+] 3.117 [4+] 2.83363 [5+] 0.0839595 Symlinks skipped = 1 (--allowlink overrides but see doc for security issue) Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.