Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/tcltrf-2.1.4-dfsg3/win/dllEntry.c
Examining data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c
Examining data/tcltrf-2.1.4-dfsg3/md5-crypt/md5c-test.c
Examining data/tcltrf-2.1.4-dfsg3/md5-crypt/md5test.c
Examining data/tcltrf-2.1.4-dfsg3/md5-crypt/md5-crypt.c
Examining data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.h
Examining data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h
Examining data/tcltrf-2.1.4-dfsg3/md5-crypt/crypt-entry.c
Examining data/tcltrf-2.1.4-dfsg3/generic/qpcode.c
Examining data/tcltrf-2.1.4-dfsg3/generic/md5dig.c
Examining data/tcltrf-2.1.4-dfsg3/generic/transformInt.h
Examining data/tcltrf-2.1.4-dfsg3/generic/hexcode.c
Examining data/tcltrf-2.1.4-dfsg3/generic/md2.c
Examining data/tcltrf-2.1.4-dfsg3/generic/ref_opt.c
Examining data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c
Examining data/tcltrf-2.1.4-dfsg3/generic/trfDecls.h
Examining data/tcltrf-2.1.4-dfsg3/generic/rmd128.c
Examining data/tcltrf-2.1.4-dfsg3/generic/init.c
Examining data/tcltrf-2.1.4-dfsg3/generic/asc85code.c
Examining data/tcltrf-2.1.4-dfsg3/generic/crc_zlib.c
Examining data/tcltrf-2.1.4-dfsg3/generic/reflect.c
Examining data/tcltrf-2.1.4-dfsg3/generic/otpsha1.c
Examining data/tcltrf-2.1.4-dfsg3/generic/util.c
Examining data/tcltrf-2.1.4-dfsg3/generic/transform.h
Examining data/tcltrf-2.1.4-dfsg3/generic/crc.c
Examining data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c
Examining data/tcltrf-2.1.4-dfsg3/generic/load.c
Examining data/tcltrf-2.1.4-dfsg3/generic/trfIntDecls.h
Examining data/tcltrf-2.1.4-dfsg3/generic/bincode.c
Examining data/tcltrf-2.1.4-dfsg3/generic/rmd160.c
Examining data/tcltrf-2.1.4-dfsg3/generic/convert.c
Examining data/tcltrf-2.1.4-dfsg3/generic/reflect.h
Examining data/tcltrf-2.1.4-dfsg3/generic/otpcode.c
Examining data/tcltrf-2.1.4-dfsg3/generic/zip.c
Examining data/tcltrf-2.1.4-dfsg3/generic/unstack.c
Examining data/tcltrf-2.1.4-dfsg3/generic/sha1.c
Examining data/tcltrf-2.1.4-dfsg3/generic/registry.c
Examining data/tcltrf-2.1.4-dfsg3/generic/b64code.c
Examining data/tcltrf-2.1.4-dfsg3/generic/md5/md5.c
Examining data/tcltrf-2.1.4-dfsg3/generic/md5/md5.h
Examining data/tcltrf-2.1.4-dfsg3/generic/zip_opt.c
Examining data/tcltrf-2.1.4-dfsg3/generic/bz2.c
Examining data/tcltrf-2.1.4-dfsg3/generic/octcode.c
Examining data/tcltrf-2.1.4-dfsg3/generic/digest.c
Examining data/tcltrf-2.1.4-dfsg3/generic/bz2_opt.c
Examining data/tcltrf-2.1.4-dfsg3/generic/trfStubLib.c
Examining data/tcltrf-2.1.4-dfsg3/generic/templates/cvt_template.c
Examining data/tcltrf-2.1.4-dfsg3/generic/templates/opt_template.c
Examining data/tcltrf-2.1.4-dfsg3/generic/templates/md_template.c
Examining data/tcltrf-2.1.4-dfsg3/generic/binio.c
Examining data/tcltrf-2.1.4-dfsg3/generic/crc.h
Examining data/tcltrf-2.1.4-dfsg3/generic/otpmd5.c
Examining data/tcltrf-2.1.4-dfsg3/generic/trfStubInit.c
Examining data/tcltrf-2.1.4-dfsg3/generic/sha/appgen.c
Examining data/tcltrf-2.1.4-dfsg3/generic/sha/sha_driver.c
Examining data/tcltrf-2.1.4-dfsg3/generic/sha/sha.h
Examining data/tcltrf-2.1.4-dfsg3/generic/sha/sha.c
Examining data/tcltrf-2.1.4-dfsg3/generic/sha.c
Examining data/tcltrf-2.1.4-dfsg3/generic/patchlevel.h
Examining data/tcltrf-2.1.4-dfsg3/generic/adler.c
Examining data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/gflib.c
Examining data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c
Examining data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/ecc.h
Examining data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/ecc.c
Examining data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/gf.h
Examining data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/version.c
Examining data/tcltrf-2.1.4-dfsg3/generic/uucode.c
Examining data/tcltrf-2.1.4-dfsg3/generic/crypt.c
Examining data/tcltrf-2.1.4-dfsg3/generic/bz2lib.c
Examining data/tcltrf-2.1.4-dfsg3/generic/zlib.c
Examining data/tcltrf-2.1.4-dfsg3/generic/loadman.c
Examining data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/havaltest.c
Examining data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/havalapp.h
Examining data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c
Examining data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.h
Examining data/tcltrf-2.1.4-dfsg3/generic/haval.c
Examining data/tcltrf-2.1.4-dfsg3/generic/md2d.c
Examining data/tcltrf-2.1.4-dfsg3/generic/md2d.h
Examining data/tcltrf-2.1.4-dfsg3/generic/loadman.h
Examining data/tcltrf-2.1.4-dfsg3/generic/ripemd/rmd128.c
Examining data/tcltrf-2.1.4-dfsg3/generic/ripemd/rmd128.h
Examining data/tcltrf-2.1.4-dfsg3/generic/ripemd/rmd160.c
Examining data/tcltrf-2.1.4-dfsg3/generic/ripemd/rmd160.h
Examining data/tcltrf-2.1.4-dfsg3/generic/ripemd/rmdcommon.h
Examining data/tcltrf-2.1.4-dfsg3/compat/bzlib.h
Examining data/tcltrf-2.1.4-dfsg3/compat/tclLoadMac.c
Examining data/tcltrf-2.1.4-dfsg3/compat/tclLoadShl.c
Examining data/tcltrf-2.1.4-dfsg3/compat/tclLoadNone.c
Examining data/tcltrf-2.1.4-dfsg3/compat/zconf.h
Examining data/tcltrf-2.1.4-dfsg3/compat/stdlib.h
Examining data/tcltrf-2.1.4-dfsg3/compat/stpncpy.c
Examining data/tcltrf-2.1.4-dfsg3/compat/zlib.h
Examining data/tcltrf-2.1.4-dfsg3/compat/_eprintf.c
Examining data/tcltrf-2.1.4-dfsg3/compat/tclLoadWin.c
Examining data/tcltrf-2.1.4-dfsg3/compat/tclLoadDyld.c
Examining data/tcltrf-2.1.4-dfsg3/compat/md2.h
Examining data/tcltrf-2.1.4-dfsg3/compat/tclLoadDld.c
Examining data/tcltrf-2.1.4-dfsg3/compat/dlfcn.h
Examining data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c
Examining data/tcltrf-2.1.4-dfsg3/compat/sha.h
Examining data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c
Examining data/tcltrf-2.1.4-dfsg3/app/tclAppInit.c
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclStubs.c
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclStubInit.c
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclDecls.h
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.0/tcl.h
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tcl.h
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tcl.h
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclStubs.c
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclStubInit.c
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclDecls.h
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclStubs.c
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclStubInit.c
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclDecls.h
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tcl.h
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclStubLib.c
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tcl.h
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c
Examining data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tcl.h

FINAL RESULTS:

data/tcltrf-2.1.4-dfsg3/compat/_eprintf.c:12:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf (stderr, string, expression, line, filename);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:123:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(errbuf, strerror(errno));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:127:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(mp->name, path);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:137:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(errbuf, path);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:147:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(errbuf, strerror(errno));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:154:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(errbuf, strerror(errno));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:164:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(errbuf, strerror(errno));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:178:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(errbuf, strerror(errno));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:226:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(errbuf, p);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:230:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(errbuf, p);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:234:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(errbuf, p);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:238:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(errbuf, p);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:241:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(errbuf, strerror(atoi(++p)));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:244:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(errbuf, s);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:267:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(errbuf, symbol);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:301:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(errbuf, strerror(errno));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:354:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(errbuf, strerror(errno));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:365:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(errbuf, strerror(errno));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:374:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(errbuf, strerror(errno));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:381:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(errbuf, strerror(errno));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:405:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(errbuf, strerror(errno));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:442:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(errbuf, strerror(errno));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:476:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(errbuf, strerror(errno));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:506:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(ep->name, symname);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:533:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(errbuf, strerror(errno));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:542:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(errbuf, strerror(errno));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:549:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(errbuf, strerror(errno));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:193:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (access(Tcl_DStringValue(&fullPath), F_OK) != -1) {
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:332:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (SymbolTableFile, relocatedFileName);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:403:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(msg, errorMessage);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:404:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(msg, err);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:444:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(errorMessage, message);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadMac.c:113:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(packageName,pkgGuess);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadMac.c:220:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(sym1, symbol);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadNone.c:71:12:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
extern int crypt (); 
data/tcltrf-2.1.4-dfsg3/compat/tclLoadNone.c:145:14:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
  { "crypt", crypt },
data/tcltrf-2.1.4-dfsg3/generic/crypt.c:96:35:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
  res = Tcl_NewStringObj ((char*) crypt (passwd, salt_b), -1);
data/tcltrf-2.1.4-dfsg3/generic/crypt.c:174:40:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
  res = Tcl_NewStringObj ((char*) md5f.crypt (passwd, salt_b), -1);
data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:378:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      o->matchFlag = strcpy (ckalloc (1 + strlen (value)), value);
data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:394:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      o->writeDestination = strcpy (ckalloc (1+strlen (value)), value);
data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:412:28:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      o->readDestination = strcpy (ckalloc (1+strlen (value)), value);
data/tcltrf-2.1.4-dfsg3/generic/load.c:83:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf,libName);
data/tcltrf-2.1.4-dfsg3/generic/load.c:111:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(buf+1,*q);
data/tcltrf-2.1.4-dfsg3/generic/loadman.h:121:18:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
  const char* (* crypt) _ANSI_ARGS_ ((const char* key, const char* salt));
data/tcltrf-2.1.4-dfsg3/generic/transformInt.h:137:27:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define PRINT      BLNKS; printf
data/tcltrf-2.1.4-dfsg3/generic/transformInt.h:139:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define NPRINT     printf
data/tcltrf-2.1.4-dfsg3/generic/transformInt.h:152:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define PRINT  if (0) printf
data/tcltrf-2.1.4-dfsg3/generic/transformInt.h:153:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define NPRINT if (0) printf
data/tcltrf-2.1.4-dfsg3/md5-crypt/crypt-entry.c:33:24:  [4] (crypto) crypt_r:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
# define __crypt_r     crypt_r
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5c-test.c:11:8:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
  cp = crypt ("Hello world!", salt);
data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h:52:14:  [4] (crypto) crypt_r:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
extern char *crypt_r _ANSI_ARGS_ ((CONST char *__key, CONST char *__salt,
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:1222:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(chanPtr->channelName, chanName);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:1416:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (chanPtr->channelName, pt->channelName);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5335:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(esPtr->script, script);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5896:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(esPtr->script, argv[4]);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:1222:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(chanPtr->channelName, chanName);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:1416:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (chanPtr->channelName, pt->channelName);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5335:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(esPtr->script, script);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5896:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(esPtr->script, argv[4]);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:1196:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(chanPtr->channelName, chanName);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:1375:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (chanPtr->channelName, pt->channelName);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5238:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(esPtr->script, script);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5797:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(esPtr->script, argv[4]);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:1284:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(chanPtr->channelName, chanName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:1531:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (chanPtr->channelName, pt->channelName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:1271:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(chanPtr->channelName, chanName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:1495:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (chanPtr->channelName, pt->channelName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:1302:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(chanPtr->channelName, chanName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:1549:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (chanPtr->channelName, pt->channelName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:1302:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(chanPtr->channelName, chanName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:1549:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (chanPtr->channelName, pt->channelName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:1284:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(chanPtr->channelName, chanName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:1531:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (chanPtr->channelName, pt->channelName);
data/tcltrf-2.1.4-dfsg3/compat/stdlib.h:33:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
extern char *		getenv _ANSI_ARGS_((CONST char *name));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:184:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      p = getenv("LD_LIBRARY_PATH");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:203:3:  [3] (tmpfile) tmpnam:
  Temporary file race condition (CWE-377).
  tmpnam (relocatedFileName);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:216:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  p = getenv("LD_LIBRARY_PATH");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadWin.c:74:23:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    handle = (VOID *) LoadLibrary(path);
data/tcltrf-2.1.4-dfsg3/compat/md2.h:72:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[MD2_BLOCK];
data/tcltrf-2.1.4-dfsg3/compat/stdlib.h:27:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
extern int		atoi _ANSI_ARGS_((CONST char *string));
data/tcltrf-2.1.4-dfsg3/compat/stdlib.h:28:14:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
extern long		atol _ANSI_ARGS_((CONST char *string));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:86:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char errbuf[BUFSIZ];
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:122:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(errbuf, "calloc: ");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:136:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(errbuf, "dlopen: ");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:138:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(errbuf, ": ");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:145:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char *tmp[BUFSIZ/sizeof(char *)];
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:163:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(errbuf, "loadbind: ");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:177:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(errbuf, "loadbind: ");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:220:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	switch(atoi(s)) {
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:222:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(errbuf, "to many errors");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:225:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(errbuf, "can't load library");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:229:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(errbuf, "can't find symbol");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:233:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(errbuf, "bad RLD");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:237:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(errbuf, "bad exec format in");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:241:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		strcat(errbuf, strerror(atoi(++p)));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:266:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(errbuf, "dlsym: undefined symbol ");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:353:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(errbuf, "readExports: ");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:364:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(errbuf, "readExports: ");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:373:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(errbuf, "readExports: ");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:380:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(errbuf, "readExports: ");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:404:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(errbuf, "readExports: ");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:411:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(errbuf, "readExports: bad magic");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:423:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(errbuf, "readExports: cannot read data section header");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:430:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(errbuf, "readExports: cannot read loader section header");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:441:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(errbuf, "readExports: ");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:449:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(errbuf, "readExports: cannot seek to loader section");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:457:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(errbuf, "readExports: cannot read loader section");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:475:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(errbuf, "readExports: ");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:490:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmpsym[SYMNMLEN+1];
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:532:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(errbuf, "findMain: ");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:541:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(errbuf, "findMain: ");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:548:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(errbuf, "findMain: ");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:148:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char relocatedFileName [L_tmpnam];
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:241:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (p, "%08lx", (long) startAddress);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:256:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  relocatedFd = open (relocatedFileName, O_RDONLY);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:475:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f = fopen (fileName, "rb")) == NULL) {
data/tcltrf-2.1.4-dfsg3/compat/tclLoadMac.c:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char packageName[255];
data/tcltrf-2.1.4-dfsg3/compat/tclLoadMac.c:128:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy((char *) errName, "file not found");
data/tcltrf-2.1.4-dfsg3/compat/tclLoadMac.c:216:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sym1[255];
data/tcltrf-2.1.4-dfsg3/generic/asc85code.c:133:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf [4];
data/tcltrf-2.1.4-dfsg3/generic/asc85code.c:145:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf [5];
data/tcltrf-2.1.4-dfsg3/generic/asc85code.c:291:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          result [5];
data/tcltrf-2.1.4-dfsg3/generic/asc85code.c:355:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          result [5];
data/tcltrf-2.1.4-dfsg3/generic/asc85code.c:513:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char   result [4];
data/tcltrf-2.1.4-dfsg3/generic/asc85code.c:641:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char result [4];
data/tcltrf-2.1.4-dfsg3/generic/asc85code.c:756:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char quint [6];
data/tcltrf-2.1.4-dfsg3/generic/asc85code.c:799:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char quint [6];
data/tcltrf-2.1.4-dfsg3/generic/b64code.c:128:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf [3];
data/tcltrf-2.1.4-dfsg3/generic/b64code.c:143:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf [4];
data/tcltrf-2.1.4-dfsg3/generic/b64code.c:344:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf [4];
data/tcltrf-2.1.4-dfsg3/generic/b64code.c:415:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf [4];
data/tcltrf-2.1.4-dfsg3/generic/b64code.c:593:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf [3];
data/tcltrf-2.1.4-dfsg3/generic/b64code.c:661:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf [3];
data/tcltrf-2.1.4-dfsg3/generic/bincode.c:331:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char  buffer [CHAR_BIT];
data/tcltrf-2.1.4-dfsg3/generic/bincode.c:562:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf [10];
data/tcltrf-2.1.4-dfsg3/generic/bincode.c:565:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buf, "0x%02x", character);
data/tcltrf-2.1.4-dfsg3/generic/bincode.c:642:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf [10];
data/tcltrf-2.1.4-dfsg3/generic/bincode.c:645:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (buf, "0x%02x", character);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:181:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(interp->result, "%d", totalRead);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:196:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(interp->result, "%d", totalRead);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:228:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        buffer [50];
data/tcltrf-2.1.4-dfsg3/generic/binio.c:262:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf [3];
data/tcltrf-2.1.4-dfsg3/generic/binio.c:435:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (buffer, "%d", packed);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:472:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        buffer [50];   /* to hold most of the read information (and its conversion) */
data/tcltrf-2.1.4-dfsg3/generic/binio.c:516:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf [3];
data/tcltrf-2.1.4-dfsg3/generic/binio.c:650:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.i, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:651:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%d", cvt.i);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:654:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.li, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:655:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%ld", cvt.li);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:662:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.i, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:663:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%o", cvt.i);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:666:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.li, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:667:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%lo", cvt.li);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:674:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.i, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:675:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%08x", cvt.i);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:678:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.li, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:679:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%08lx", cvt.li);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:686:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.ui, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:687:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%u", cvt.ui);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:690:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.ul, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:691:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%lu", cvt.ul);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:697:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.si, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:698:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%d", cvt.si);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:703:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.si, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:704:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%o", cvt.si);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:709:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.si, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:710:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%04x", cvt.si);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:715:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.us, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:716:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%u", cvt.us);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:721:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.li, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:722:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%ld", cvt.li);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:727:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.ul, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:728:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%lu", cvt.ul);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:732:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.c, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:734:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%d", cvt.i);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:738:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.uc, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:740:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%u", cvt.ui);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:744:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.f, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:745:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%f", cvt.f);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:749:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ((VOID*) &cvt.d, (VOID*) buffer, length);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:750:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buffer, "%f", cvt.d);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:767:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (buffer, "%d", unpacked);
data/tcltrf-2.1.4-dfsg3/generic/crypt.c:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        salt_b [3];
data/tcltrf-2.1.4-dfsg3/generic/crypt.c:134:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        salt_b [12];
data/tcltrf-2.1.4-dfsg3/generic/digest.c:208:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy ((VOID*) md, (VOID*) &mdDefinition, sizeof (Trf_TypeDefinition));
data/tcltrf-2.1.4-dfsg3/generic/digest.c:791:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy ( (VOID*) (c->digest_buffer + c->charCount), (VOID*) buffer, bufLen);
data/tcltrf-2.1.4-dfsg3/generic/digest.c:837:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy ((VOID*) (c->digest_buffer + c->charCount),
data/tcltrf-2.1.4-dfsg3/generic/digest.c:960:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy ((VOID*) c->digest_buffer, (VOID*) temp, md->digest_size);
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:95:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char padding[128] = {        /* constants for padding */
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:277:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buffer[1024];
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:279:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((file = fopen (file_name, "rb")) == NULL){
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:297:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buffer[32],
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:354:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (((unsigned char *)state->block)+rmd_len, str, fill_len);
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:357:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy ((unsigned char *)state->block, str+i, 128);
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:364:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (((unsigned char *)state->block)+rmd_len, str+i, str_len-i);
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:370:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (&state->remainder[rmd_len], str, fill_len);
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:374:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (state->remainder, str+i, 128);
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:383:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&state->remainder[rmd_len], str+i, str_len-i);
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:391:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tail[10];
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.h:83:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char remainder[32*4];         /* unhashed chars (No.<128) */   
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/havaltest.c:84:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char fingerprint[FPTLEN >> 3];
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/havaltest.c:128:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buff[BLOCK_SIZE];
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/havaltest.c:129:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char fingerprint[FPTLEN >> 3];
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/havaltest.c:170:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char fingerprint[FPTLEN >> 3];
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/havaltest.c:226:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char str[4] = {'A', 'B', 'C', 'D'};
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/havaltest.c:237:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void haval_print (unsigned char fingerprint[FPTLEN >> 3])
data/tcltrf-2.1.4-dfsg3/generic/hexcode.c:302:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char   buffer [2];
data/tcltrf-2.1.4-dfsg3/generic/hexcode.c:525:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf [10];
data/tcltrf-2.1.4-dfsg3/generic/hexcode.c:528:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buf, "0x%02x", character);
data/tcltrf-2.1.4-dfsg3/generic/hexcode.c:605:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf [10];
data/tcltrf-2.1.4-dfsg3/generic/hexcode.c:608:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (buf, "0x%02x", nibble);
data/tcltrf-2.1.4-dfsg3/generic/load.c:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/tcltrf-2.1.4-dfsg3/generic/load.c:100:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	    strcpy(buf+length,".sl");
data/tcltrf-2.1.4-dfsg3/generic/md2d.c:42:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char subst[256] = {
data/tcltrf-2.1.4-dfsg3/generic/md2d.c:72:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char x[48], L;
data/tcltrf-2.1.4-dfsg3/generic/md2d.c:93:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(m->state, x, 16);
data/tcltrf-2.1.4-dfsg3/generic/md2d.c:106:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(m->data + idx, p, 16 - idx);
data/tcltrf-2.1.4-dfsg3/generic/md2d.c:119:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(m->data + idx, p, len);
data/tcltrf-2.1.4-dfsg3/generic/md2d.c:125:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char pad[16];
data/tcltrf-2.1.4-dfsg3/generic/md2d.c:132:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pad, m->checksum, 16);
data/tcltrf-2.1.4-dfsg3/generic/md2d.c:135:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(res, m->state, MD2_DIGEST_LENGTH);
data/tcltrf-2.1.4-dfsg3/generic/md2d.h:51:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[16]; /* stored unalligned data between Update's */
data/tcltrf-2.1.4-dfsg3/generic/md2d.h:52:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char checksum[16];
data/tcltrf-2.1.4-dfsg3/generic/md2d.h:53:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char state[16]; /* lower 16 bytes of X */
data/tcltrf-2.1.4-dfsg3/generic/md5/md5.c:54:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char PADDING[64] = {
data/tcltrf-2.1.4-dfsg3/generic/md5/md5.c:155:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char digest[16]; MD5_CTX *mdContext;
data/tcltrf-2.1.4-dfsg3/generic/md5/md5.h:64:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char in[64];                              /* input buffer */
data/tcltrf-2.1.4-dfsg3/generic/md5/md5.h:69:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void MD5Final  _ANSI_ARGS_ ((unsigned char digest[16], MD5_CTX *mdContext));
data/tcltrf-2.1.4-dfsg3/generic/md5dig.c:248:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char result[16];
data/tcltrf-2.1.4-dfsg3/generic/md5dig.c:256:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy ((VOID *) digest, (VOID *) result, DIGEST_SIZE);
data/tcltrf-2.1.4-dfsg3/generic/octcode.c:325:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char   buffer [3];
data/tcltrf-2.1.4-dfsg3/generic/octcode.c:544:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf [10];
data/tcltrf-2.1.4-dfsg3/generic/octcode.c:547:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf (buf, "0x%02x", character);
data/tcltrf-2.1.4-dfsg3/generic/octcode.c:623:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf [10];
data/tcltrf-2.1.4-dfsg3/generic/octcode.c:626:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (buf, "0x%02x", character);
data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:136:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[8];
data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:149:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   words[6][5];
data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:168:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char Wp[2048][4] = { /* THREADING: constant, read-only => safe */
data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:2437:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   cp[10];
data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:2457:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (cp, c -> buf, sizeof c -> buf);
data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:2466:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     buf[5];
data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:2759:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   b[9];
data/tcltrf-2.1.4-dfsg3/generic/qpcode.c:140:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[CPERLIN + 8];
data/tcltrf-2.1.4-dfsg3/generic/qpcode.c:160:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char hex2nib[0x80] = {
data/tcltrf-2.1.4-dfsg3/generic/qpcode.c:324:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        (void) sprintf ((char*) c -> buf, "=%02X", '.');
data/tcltrf-2.1.4-dfsg3/generic/qpcode.c:331:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        (void) sprintf ((char*) c -> buf, "=%02Xrom ", 'F');
data/tcltrf-2.1.4-dfsg3/generic/qpcode.c:356:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (void) sprintf ((char*) c -> buf + c -> charCount,
data/tcltrf-2.1.4-dfsg3/generic/qpcode.c:449:18:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
          (void) strcpy ((char*) c -> buf + c -> charCount - 1, "=\n\n");
data/tcltrf-2.1.4-dfsg3/generic/qpcode.c:457:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    (void) strcpy ((char*) c -> buf + c -> charCount, "=\n");
data/tcltrf-2.1.4-dfsg3/generic/registry.c:1259:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                   block [2] = {0,0};
data/tcltrf-2.1.4-dfsg3/generic/registry.c:2340:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char policy [20];
data/tcltrf-2.1.4-dfsg3/generic/registry.c:2368:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char policy [20];
data/tcltrf-2.1.4-dfsg3/generic/registry.c:2526:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (tmp, buf, length);
data/tcltrf-2.1.4-dfsg3/generic/registry.c:3635:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy ((VOID*) buf, (VOID*) r->buf, toRead);
data/tcltrf-2.1.4-dfsg3/generic/registry.c:3648:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy  ((VOID*) buf,    (VOID*) r->buf,            toRead);
data/tcltrf-2.1.4-dfsg3/generic/registry.c:3661:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy ((VOID*) buf, (VOID*) r->buf, r->used);
data/tcltrf-2.1.4-dfsg3/generic/registry.c:3771:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (r->buf + r->used, buf, toWrite);
data/tcltrf-2.1.4-dfsg3/generic/registry.c:4140:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (policy, "identity");
data/tcltrf-2.1.4-dfsg3/generic/registry.c:4151:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (policy, "unseekable");
data/tcltrf-2.1.4-dfsg3/generic/registry.c:4351:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (tmp, bytes, len);
data/tcltrf-2.1.4-dfsg3/generic/rmd128.c:212:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy ((VOID*) (ctx->buf + ctx->byteCount), (VOID*) buffer, bufLen);
data/tcltrf-2.1.4-dfsg3/generic/rmd128.c:224:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy ((VOID*) (ctx->buf + ctx->byteCount), (VOID*) buffer, k);
data/tcltrf-2.1.4-dfsg3/generic/rmd128.c:254:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy ((VOID*) ctx->buf, (VOID*) buffer, bufLen);
data/tcltrf-2.1.4-dfsg3/generic/rmd128.c:289:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (digest, ctx->state, DIGEST_SIZE);
data/tcltrf-2.1.4-dfsg3/generic/rmd160.c:212:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy ((VOID*) (ctx->buf + ctx->byteCount), (VOID*) buffer, bufLen);
data/tcltrf-2.1.4-dfsg3/generic/rmd160.c:224:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy ((VOID*) (ctx->buf + ctx->byteCount), (VOID*) buffer, k);
data/tcltrf-2.1.4-dfsg3/generic/rmd160.c:254:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy ((VOID*) ctx->buf, (VOID*) buffer, bufLen);
data/tcltrf-2.1.4-dfsg3/generic/rmd160.c:289:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (digest, ctx->state, DIGEST_SIZE);
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/ecc.c:76:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char msg[249], coded[255];
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/ecc.c:107:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char msgs[249], cod[255];
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/ecc.h:29:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char g[6] =
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/gf.h:30:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char e2v[256] =
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/gf.h:48:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char v2e[256] =
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:48:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     unsigned char m[249], c[255];
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:52:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char r[6], rtmp;
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:80:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:83:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     unsigned char p[255], x;
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:108:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     unsigned char c[255], s[7];
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:111:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  extern unsigned char e2v[256];
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:132:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     unsigned char s[7], *det;
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:170:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     unsigned char code[255], mesg[249];
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:174:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  extern unsigned char v2e[256];
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:175:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char syn[7], deter, z[4], e0, e1, e2, n0, n1, n2, w0, w1, w2,
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:322:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     unsigned char polynom[4], roots[3];
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:326:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  extern unsigned char e2v[256];
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:40:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void rsencode _ANSI_ARGS_ ((unsigned char m [MSG_LEN],
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:41:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			    unsigned char c [CODE_LEN]));
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:42:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void rsdecode _ANSI_ARGS_ ((unsigned char c [CODE_LEN],
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:43:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			    unsigned char m [MSG_LEN], int* errcode));
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:131:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char block [MSG_LEN];
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:143:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char block [CODE_LEN];
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:285:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char out [CODE_LEN];
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:331:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char out [CODE_LEN], oldchar;
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:347:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy ((VOID*) (c->block + c->charCount), (VOID*) buffer, bufLen);
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:353:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy ((VOID*) (c->block + c->charCount), (VOID*) buffer, k);
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:396:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy ((VOID*) c->block, (VOID*) buffer, bufLen);
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:442:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char out [CODE_LEN];
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:590:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char msg [MSG_LEN];
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:646:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char msg [MSG_LEN];
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:662:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy ((VOID*) (c->block + c->charCount), (VOID*) buffer, bufLen);
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:668:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy ((VOID*) (c->block + c->charCount), (VOID*) buffer, k);
data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:719:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy ((VOID*) c->block, (VOID*) buffer, bufLen);
data/tcltrf-2.1.4-dfsg3/generic/sha.c:61:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char  buf [CHUNK_SIZE]; /* SHA block */
data/tcltrf-2.1.4-dfsg3/generic/sha.c:211:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy ((VOID*) (s->buf + s->count), (VOID*) buffer, bufLen);
data/tcltrf-2.1.4-dfsg3/generic/sha.c:223:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy ((VOID*) (s->buf + s->count), (VOID*) buffer, k);
data/tcltrf-2.1.4-dfsg3/generic/sha.c:240:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy ((VOID*) s->buf, (VOID*) buffer, bufLen);
data/tcltrf-2.1.4-dfsg3/generic/sha.c:280:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (digest, s->s.digest, SHA_DIGESTSIZE);
data/tcltrf-2.1.4-dfsg3/generic/sha/appgen.c:7:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    t = atoi(v[1]);
data/tcltrf-2.1.4-dfsg3/generic/sha/sha.c:169:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sha_info->data, buffer, SHA_BLOCKSIZE);
data/tcltrf-2.1.4-dfsg3/generic/sha/sha.c:177:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sha_info->data, buffer, count);
data/tcltrf-2.1.4-dfsg3/generic/sha/sha_driver.c:20:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    fin = fopen(*(++argv), "rb");
data/tcltrf-2.1.4-dfsg3/generic/sha1.c:224:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy ((VOID *) digest, (VOID *) result, DIGEST_SIZE);
data/tcltrf-2.1.4-dfsg3/generic/templates/md_template.c:182:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy ((VOID*) (s->buf + s->count), (VOID*) buffer, bufLen);
data/tcltrf-2.1.4-dfsg3/generic/templates/md_template.c:194:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy ((VOID*) (s->buf + s->count), (VOID*) buffer, k);
data/tcltrf-2.1.4-dfsg3/generic/templates/md_template.c:211:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy ((VOID*) s->buf, (VOID*) buffer, bufLen);
data/tcltrf-2.1.4-dfsg3/generic/util.c:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf [3];
data/tcltrf-2.1.4-dfsg3/generic/util.c:74:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (buf, in,   length);
data/tcltrf-2.1.4-dfsg3/generic/util.c:358:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (buffer, mask, length);
data/tcltrf-2.1.4-dfsg3/generic/uucode.c:127:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf [3];
data/tcltrf-2.1.4-dfsg3/generic/uucode.c:139:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf [4];
data/tcltrf-2.1.4-dfsg3/generic/uucode.c:338:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf [4];
data/tcltrf-2.1.4-dfsg3/generic/uucode.c:382:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf [4];
data/tcltrf-2.1.4-dfsg3/generic/uucode.c:550:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf [3];
data/tcltrf-2.1.4-dfsg3/generic/uucode.c:618:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf [3];
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5-crypt.c:59:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char b64t[64] =
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5-crypt.c:79:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char alt_result[16];
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:39:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(d, s, n) bcopy ((s), (d), (n))
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:39:27:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(d, s, n) bcopy ((s), (d), (n))
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:72:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char fillbuf[64] = { 0x80, 0 /* , 0, 0, ...  */ };
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:128:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&ctx->buffer[bytes], fillbuf, pad);
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BLOCKSIZE + 72];
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:233:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&ctx->buffer[left_over], buffer, add);
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:240:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (ctx->buffer, &ctx->buffer[(left_over + add) & ~63],
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:251:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->buffer, buffer, 64);
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:268:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (ctx->buffer, buffer, len);
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.h:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128];
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5test.c:7:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char result[16];
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5test.c:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sum[16];
data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      keysched[16 * 8];
data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      sb0[32768];
data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h:39:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      sb1[32768];
data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      sb2[32768];
data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      sb3[32768];
data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      crypt_3_buf[14];
data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      current_salt[2];
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tcl.h:642:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char staticSpace[TCL_DSTRING_STATIC_SIZE];
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tcl.h:791:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[4];			/* String for key.  The actual size
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1];		/* Copy buffer, this must be the last
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4];		/* Placeholder for real buffer. The real
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:2467:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((VOID *) destPtr, (VOID *) srcPtr, (size_t) destCopied);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:2471:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((VOID *) destPtr, (VOID *) srcPtr, (size_t) destCopied);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:2831:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:2849:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4305:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char c[sizeof(short)];
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4341:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char optionVal[128];	/* Buffer for sprintf. */
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4445:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[4];
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4447:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "%c", chanPtr->inEofChar);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4455:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[4];
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4457:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "%c", chanPtr->outEofChar);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4626:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        chanPtr->bufSize = atoi(newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5544:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];		/* For sprintf. */
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5681:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%d", IOQueued);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5747:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%d", IOQueued);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5789:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%d", chanPtr->refCount);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tcl.h:649:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char staticSpace[TCL_DSTRING_STATIC_SIZE];
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tcl.h:806:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[4];			/* String for key.  The actual size
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1];		/* Copy buffer, this must be the last
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4];		/* Placeholder for real buffer. The real
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:2467:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((VOID *) destPtr, (VOID *) srcPtr, (size_t) destCopied);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:2471:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((VOID *) destPtr, (VOID *) srcPtr, (size_t) destCopied);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:2831:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:2849:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4305:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char c[sizeof(short)];
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4341:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char optionVal[128];	/* Buffer for sprintf. */
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4445:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[4];
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4447:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "%c", chanPtr->inEofChar);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4455:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[4];
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4457:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "%c", chanPtr->outEofChar);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4626:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        chanPtr->bufSize = atoi(newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5544:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];		/* For sprintf. */
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5681:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%d", IOQueued);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5747:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%d", IOQueued);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5789:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%d", chanPtr->refCount);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tcl.h:576:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char staticSpace[TCL_DSTRING_STATIC_SIZE];
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tcl.h:725:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[4];			/* String for key.  The actual size
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1];		/* Copy buffer, this must be the last
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4];		/* Placeholder for real buffer. The real
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:2410:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((VOID *) destPtr, (VOID *) srcPtr, (size_t) destCopied);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:2414:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((VOID *) destPtr, (VOID *) srcPtr, (size_t) destCopied);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:2774:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:2792:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4214:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char c[sizeof(short)];
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4250:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char optionVal[128];	/* Buffer for sprintf. */
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4354:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[4];
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4356:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "%c", chanPtr->inEofChar);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4364:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[4];
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4366:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "%c", chanPtr->outEofChar);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4535:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        chanPtr->bufSize = atoi(newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5447:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];		/* For sprintf. */
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5584:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%d", IOQueued);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5650:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%d", IOQueued);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5692:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%d", chanPtr->refCount);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1];		/* Copy buffer, this must be the last
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4];		/* Placeholder for real buffer. The real
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:2768:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char safe[BUFFER_PADDING];
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:2842:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) dst, (VOID *) safe, (size_t) saved);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:2877:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) safe, (VOID *) (dst + dstLen), (size_t) saved);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:3292:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[1 + TCL_UTF_MAX];
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:3598:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) (nextPtr->buf + BUFFER_PADDING - extra),
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:3743:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) (bufPtr->buf + bufPtr->nextAdded),
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:4186:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((VOID *) (nextPtr->buf + nextPtr->nextRemoved), (VOID *) src,
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:4311:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:4320:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5307:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char optionVal[128];	/* Buffer for sprintf. */
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5413:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[4];
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5415:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "%c", chanPtr->inEofChar);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5423:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[4];
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5425:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "%c", chanPtr->outEofChar);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5590:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        chanPtr->bufSize = atoi(newValue);	/* INTL: "C", UTF safe. */
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:6519:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[TCL_INTEGER_SPACE];/* For sprintf. */
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:7459:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:7481:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:7520:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:7563:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:7718:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:7722:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tcl.h:502:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char resultSpace[TCL_RESULT_SIZE+1];
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tcl.h:616:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char staticSpace[TCL_DSTRING_STATIC_SIZE];
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tcl.h:787:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[4];			/* String for key.  The actual size
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1];		/* Copy buffer, this must be the last
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4];		/* Placeholder for real buffer. The real
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:2706:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char safe[BUFFER_PADDING];
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:2780:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) dst, (VOID *) safe, (size_t) saved);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:2815:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) safe, (VOID *) (dst + dstLen), (size_t) saved);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:2892:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) dst, (VOID *) src, (size_t) srcLen);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:2909:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) dst, (VOID *) src, (size_t) srcLen);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:3227:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[1 + TCL_UTF_MAX];
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:3522:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) (nextPtr->buf + BUFFER_PADDING - extra),
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:3667:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) (bufPtr->buf + bufPtr->nextAdded),
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:4100:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((VOID *) (nextPtr->buf + nextPtr->nextRemoved), (VOID *) src,
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:4225:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:4234:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5235:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char c[sizeof(short)];
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5271:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char optionVal[128];	/* Buffer for sprintf. */
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5394:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[4];
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5396:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "%c", chanPtr->inEofChar);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5404:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[4];
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5406:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "%c", chanPtr->outEofChar);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5571:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        chanPtr->bufSize = atoi(newValue);	/* INTL: "C", UTF safe. */
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:6540:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[TCL_INTEGER_SPACE];/* For sprintf. */
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:7471:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:7493:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:7532:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:7575:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:7730:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:7734:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tcl.h:566:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char resultSpace[TCL_RESULT_SIZE+1];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tcl.h:680:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char staticSpace[TCL_DSTRING_STATIC_SIZE];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tcl.h:851:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[4];			/* String for key.  The actual size
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1];		/* Copy buffer, this must be the last
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4];		/* Placeholder for real buffer. The real
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:1289:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char c[sizeof(short)];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:2786:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char safe[BUFFER_PADDING];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:2860:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) dst, (VOID *) safe, (size_t) saved);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:2895:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) safe, (VOID *) (dst + dstLen), (size_t) saved);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:3310:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[1 + TCL_UTF_MAX];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:3616:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) (nextPtr->buf + BUFFER_PADDING - extra),
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:3761:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) (bufPtr->buf + bufPtr->nextAdded),
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:4204:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((VOID *) (nextPtr->buf + nextPtr->nextRemoved), (VOID *) src,
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:4329:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:4338:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5357:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char optionVal[128];	/* Buffer for sprintf. */
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5482:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[4];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5484:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "%c", chanPtr->inEofChar);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5492:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[4];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5494:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "%c", chanPtr->outEofChar);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5659:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        chanPtr->bufSize = atoi(newValue);	/* INTL: "C", UTF safe. */
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:6622:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[TCL_INTEGER_SPACE];/* For sprintf. */
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:7562:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:7584:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:7623:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:7666:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:7821:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:7825:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tcl.h:600:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char resultSpace[TCL_RESULT_SIZE+1];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tcl.h:714:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char staticSpace[TCL_DSTRING_STATIC_SIZE];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tcl.h:884:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[4];			/* String for key.  The actual size
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1];		/* Copy buffer, this must be the last
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4];		/* Placeholder for real buffer. The real
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:1289:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char c[sizeof(short)];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:2786:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char safe[BUFFER_PADDING];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:2860:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) dst, (VOID *) safe, (size_t) saved);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:2895:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) safe, (VOID *) (dst + dstLen), (size_t) saved);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:3310:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[1 + TCL_UTF_MAX];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:3616:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) (nextPtr->buf + BUFFER_PADDING - extra),
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:3761:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) (bufPtr->buf + bufPtr->nextAdded),
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:4204:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((VOID *) (nextPtr->buf + nextPtr->nextRemoved), (VOID *) src,
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:4329:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:4338:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5357:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char optionVal[128];	/* Buffer for sprintf. */
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5482:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[4];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5484:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "%c", chanPtr->inEofChar);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5492:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[4];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5494:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "%c", chanPtr->outEofChar);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5659:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        chanPtr->bufSize = atoi(newValue);	/* INTL: "C", UTF safe. */
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:6622:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[TCL_INTEGER_SPACE];/* For sprintf. */
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:7562:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:7584:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:7623:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:7666:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:7821:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:7825:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1];		/* Copy buffer, this must be the last
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4];		/* Placeholder for real buffer. The real
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:2768:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char safe[BUFFER_PADDING];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:2842:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) dst, (VOID *) safe, (size_t) saved);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:2877:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) safe, (VOID *) (dst + dstLen), (size_t) saved);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:3292:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[1 + TCL_UTF_MAX];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:3598:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) (nextPtr->buf + BUFFER_PADDING - extra),
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:3743:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) (bufPtr->buf + bufPtr->nextAdded),
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:4186:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((VOID *) (nextPtr->buf + nextPtr->nextRemoved), (VOID *) src,
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:4311:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:4320:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5307:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char optionVal[128];	/* Buffer for sprintf. */
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5413:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[4];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5415:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "%c", chanPtr->inEofChar);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5423:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[4];
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5425:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "%c", chanPtr->outEofChar);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5590:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        chanPtr->bufSize = atoi(newValue);	/* INTL: "C", UTF safe. */
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:6518:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[TCL_INTEGER_SPACE];/* For sprintf. */
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:7458:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:7480:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:7519:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:7562:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy((VOID *) result,
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:7717:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:7721:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:126:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	mp->name = malloc((unsigned) (strlen(path) + 1));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:501:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(tmpsym, ls->l_name, SYMNMLEN);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:505:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ep->name = malloc((unsigned) (strlen(symname) + 1));
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:260:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  status= read (relocatedFd, (char *) & relocatedHead, sizeof relocatedHead);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:308:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (read (relocatedFd, startAddress, relocatedSize) < relocatedSize) {
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:331:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    SymbolTableFile = ckalloc (strlen (relocatedFileName) + 1);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:402:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	msg = ckalloc(strlen(errorMessage)+strlen(err)+1);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:402:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	msg = ckalloc(strlen(errorMessage)+strlen(err)+1);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:443:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    errorMessage = ckalloc(strlen(message)+1);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:483:29:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (*p != '\0' && (c = getc (f)) != EOF) {
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:505:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((c = getc (f)) != '\0' && c != EOF) {
data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:593:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    r += strlen(r) - (p-pkgGuess);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadMac.c:126:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    err = FSpLocationFromPath(strlen(path), (char *) path, &fileSpec);
data/tcltrf-2.1.4-dfsg3/compat/tclLoadShl.c:48:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = strlen(path);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:412:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      bufLen  = strlen (argv [0]);
data/tcltrf-2.1.4-dfsg3/generic/binio.c:939:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen (argv [1]);
data/tcltrf-2.1.4-dfsg3/generic/bz2_opt.c:245:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int              len = strlen (optname + 1);
data/tcltrf-2.1.4-dfsg3/generic/bz2_opt.c:254:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen (value);
data/tcltrf-2.1.4-dfsg3/generic/bz2_opt.c:286:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len   = strlen (value);
data/tcltrf-2.1.4-dfsg3/generic/convert.c:235:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen (optname+1);
data/tcltrf-2.1.4-dfsg3/generic/convert.c:243:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len   = strlen (value);
data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:360:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = strlen (optname);
data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:378:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      o->matchFlag = strcpy (ckalloc (1 + strlen (value)), value);
data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:394:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      o->writeDestination = strcpy (ckalloc (1+strlen (value)), value);
data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:412:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      o->readDestination = strcpy (ckalloc (1+strlen (value)), value);
data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:490:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = strlen (typeString);
data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:543:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = strlen (modeString);
data/tcltrf-2.1.4-dfsg3/generic/digest.c:1056:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Tcl_Obj* varName = Tcl_NewStringObj (destHandle, strlen (destHandle));
data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:264:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  unsigned int  len = strlen (string);
data/tcltrf-2.1.4-dfsg3/generic/load.c:82:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = strlen(libName);
data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:2474:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = c -> write (c -> writeClientData, (unsigned char*) buf, strlen (buf),
data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:2788:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen (w) < 4)
data/tcltrf-2.1.4-dfsg3/generic/ref_opt.c:259:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen (optname+1);
data/tcltrf-2.1.4-dfsg3/generic/ref_opt.c:267:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen (value);
data/tcltrf-2.1.4-dfsg3/generic/registry.c:832:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen (option);
data/tcltrf-2.1.4-dfsg3/generic/registry.c:1439:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int       gotBytes, read, i, res, copied, maxRead;
data/tcltrf-2.1.4-dfsg3/generic/registry.c:1542:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    PRINT ("Retrieved = %d {\n", read);
data/tcltrf-2.1.4-dfsg3/generic/registry.c:1543:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    DUMP  (read, buf);
data/tcltrf-2.1.4-dfsg3/generic/registry.c:1545:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    STREAM_IN (trans, read, buf);
data/tcltrf-2.1.4-dfsg3/generic/registry.c:1547:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read < 0) {
data/tcltrf-2.1.4-dfsg3/generic/registry.c:1652:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					       (unsigned char*) buf, read,
data/tcltrf-2.1.4-dfsg3/generic/registry.c:1659:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      for (i=0; i < read; i++) {
data/tcltrf-2.1.4-dfsg3/generic/registry.c:1678:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    trans->seekState.downLoc += read;
data/tcltrf-2.1.4-dfsg3/generic/registry.c:1681:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      trans->seekState.aheadOffset += (read % trans->seekState.used.numBytesDown);
data/tcltrf-2.1.4-dfsg3/generic/registry.c:4157:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy (policy, "");
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/ecc.c:111:10:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (getc (stdin) == 71)
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/ecc.c:115:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	cod[i] = getc (stdin);
data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/ecc.c:129:7:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (getc (stdin) != EOF)
data/tcltrf-2.1.4-dfsg3/generic/templates/opt_template.c:224:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = strlen (optname + 1);
data/tcltrf-2.1.4-dfsg3/generic/zip_opt.c:248:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int              len = strlen (optname + 1);
data/tcltrf-2.1.4-dfsg3/generic/zip_opt.c:258:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen (value);
data/tcltrf-2.1.4-dfsg3/generic/zip_opt.c:289:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len   = strlen (value);
data/tcltrf-2.1.4-dfsg3/generic/zip_opt.c:322:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen (value);
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5-crypt.c:94:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  key_len = strlen (key);
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5-crypt.c:240:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int needed = 3 + strlen (salt) + 1 + 26 + 1;
data/tcltrf-2.1.4-dfsg3/md5-crypt/md5test.c:39:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      md5_process_bytes (tests[cnt].input, strlen (tests[cnt].input), &ctx);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:1221:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        chanPtr->channelName = ckalloc((unsigned) (strlen(chanName) + 1));
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:1415:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  chanPtr->channelName = (char *) ckalloc (strlen(pt->channelName)+1);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:2376:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        slen = strlen(srcPtr);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4376:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(optionName);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4584:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(optionName);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4601:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4638:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int nv_len = strlen (newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5334:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    esPtr->script = ckalloc((unsigned) (strlen(script) + 1));
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5448:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = strlen(argv[2]);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5552:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmdName);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5868:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmd);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5895:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        esPtr->script = ckalloc((unsigned) (strlen(argv[4]) + 1));
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:1221:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        chanPtr->channelName = ckalloc((unsigned) (strlen(chanName) + 1));
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:1415:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  chanPtr->channelName = (char *) ckalloc (strlen(pt->channelName)+1);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:2376:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        slen = strlen(srcPtr);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4376:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(optionName);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4584:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(optionName);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4601:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4638:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int nv_len = strlen (newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5334:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    esPtr->script = ckalloc((unsigned) (strlen(script) + 1));
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5448:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = strlen(argv[2]);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5552:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmdName);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5868:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmd);
data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5895:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        esPtr->script = ckalloc((unsigned) (strlen(argv[4]) + 1));
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:1195:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        chanPtr->channelName = ckalloc((unsigned) (strlen(chanName) + 1));
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:1374:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  chanPtr->channelName = (char *) ckalloc (strlen(pt->channelName)+1);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:2319:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        slen = strlen(srcPtr);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4285:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(optionName);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4493:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(optionName);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4510:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4547:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int nv_len = strlen (newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5237:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    esPtr->script = ckalloc((unsigned) (strlen(script) + 1));
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5351:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = strlen(argv[2]);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5455:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmdName);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5771:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmd);
data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5796:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        esPtr->script = ckalloc((unsigned) (strlen(argv[4]) + 1));
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:1283:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        chanPtr->channelName = ckalloc((unsigned) (strlen(chanName) + 1));
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:1530:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  chanPtr->channelName = (char *) ckalloc (strlen(pt->channelName)+1);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:2541:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        srcLen = strlen(src);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:2582:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(src);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:3505:2:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	read:
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:3589:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		goto read;
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5342:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(optionName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5552:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(optionName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5567:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:6527:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmdName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:6846:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmd);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:1270:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        chanPtr->channelName = ckalloc((unsigned) (strlen(chanName) + 1));
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:1494:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  chanPtr->channelName = (char *) ckalloc (strlen(pt->channelName)+1);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:2480:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        srcLen = strlen(src);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:2521:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(src);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:3429:2:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	read:
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:3513:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		goto read;
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5306:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(optionName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5533:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(optionName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5548:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5581:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int nv_len = strlen (newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:6548:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmdName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:6867:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmd);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:1301:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        chanPtr->channelName = ckalloc((unsigned) (strlen(chanName) + 1));
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:1548:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  chanPtr->channelName = (char *) ckalloc (strlen(pt->channelName)+1);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:2559:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        srcLen = strlen(src);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:2600:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(src);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:3523:2:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	read:
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:3607:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		goto read;
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5392:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(optionName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5621:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(optionName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5636:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5671:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int nv_len = strlen (newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:6630:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmdName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:6949:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmd);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:1301:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        chanPtr->channelName = ckalloc((unsigned) (strlen(chanName) + 1));
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:1548:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  chanPtr->channelName = (char *) ckalloc (strlen(pt->channelName)+1);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:2559:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        srcLen = strlen(src);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:2600:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(src);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:3523:2:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	read:
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:3607:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		goto read;
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5392:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(optionName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5621:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(optionName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5636:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5671:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int nv_len = strlen (newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:6630:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmdName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:6949:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmd);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:1283:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        chanPtr->channelName = ckalloc((unsigned) (strlen(chanName) + 1));
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:1530:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  chanPtr->channelName = (char *) ckalloc (strlen(pt->channelName)+1);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:2541:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        srcLen = strlen(src);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:2582:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(src);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:3505:2:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	read:
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:3589:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		goto read;
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5342:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(optionName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5552:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(optionName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5567:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(newValue);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:6526:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmdName);
data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:6845:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmd);

ANALYSIS SUMMARY:

Hits = 686
Lines analyzed = 126987 in approximately 3.02 seconds (42106 lines/second)
Physical Source Lines of Code (SLOC) = 73148
Hits@level = [0]  82 [1] 150 [2] 458 [3]   5 [4]  73 [5]   0
Hits@level+ = [0+] 768 [1+] 686 [2+] 536 [3+]  78 [4+]  73 [5+]   0
Hits/KSLOC@level+ = [0+] 10.4993 [1+] 9.37825 [2+] 7.32761 [3+] 1.06633 [4+] 0.997977 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.