Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/tcltrf-2.1.4-dfsg3/win/dllEntry.c Examining data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c Examining data/tcltrf-2.1.4-dfsg3/md5-crypt/md5c-test.c Examining data/tcltrf-2.1.4-dfsg3/md5-crypt/md5test.c Examining data/tcltrf-2.1.4-dfsg3/md5-crypt/md5-crypt.c Examining data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.h Examining data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h Examining data/tcltrf-2.1.4-dfsg3/md5-crypt/crypt-entry.c Examining data/tcltrf-2.1.4-dfsg3/generic/qpcode.c Examining data/tcltrf-2.1.4-dfsg3/generic/md5dig.c Examining data/tcltrf-2.1.4-dfsg3/generic/transformInt.h Examining data/tcltrf-2.1.4-dfsg3/generic/hexcode.c Examining data/tcltrf-2.1.4-dfsg3/generic/md2.c Examining data/tcltrf-2.1.4-dfsg3/generic/ref_opt.c Examining data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c Examining data/tcltrf-2.1.4-dfsg3/generic/trfDecls.h Examining data/tcltrf-2.1.4-dfsg3/generic/rmd128.c Examining data/tcltrf-2.1.4-dfsg3/generic/init.c Examining data/tcltrf-2.1.4-dfsg3/generic/asc85code.c Examining data/tcltrf-2.1.4-dfsg3/generic/crc_zlib.c Examining data/tcltrf-2.1.4-dfsg3/generic/reflect.c Examining data/tcltrf-2.1.4-dfsg3/generic/otpsha1.c Examining data/tcltrf-2.1.4-dfsg3/generic/util.c Examining data/tcltrf-2.1.4-dfsg3/generic/transform.h Examining data/tcltrf-2.1.4-dfsg3/generic/crc.c Examining data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c Examining data/tcltrf-2.1.4-dfsg3/generic/load.c Examining data/tcltrf-2.1.4-dfsg3/generic/trfIntDecls.h Examining data/tcltrf-2.1.4-dfsg3/generic/bincode.c Examining data/tcltrf-2.1.4-dfsg3/generic/rmd160.c Examining data/tcltrf-2.1.4-dfsg3/generic/convert.c Examining data/tcltrf-2.1.4-dfsg3/generic/reflect.h Examining data/tcltrf-2.1.4-dfsg3/generic/otpcode.c Examining data/tcltrf-2.1.4-dfsg3/generic/zip.c Examining data/tcltrf-2.1.4-dfsg3/generic/unstack.c Examining data/tcltrf-2.1.4-dfsg3/generic/sha1.c Examining data/tcltrf-2.1.4-dfsg3/generic/registry.c Examining data/tcltrf-2.1.4-dfsg3/generic/b64code.c Examining data/tcltrf-2.1.4-dfsg3/generic/md5/md5.c Examining data/tcltrf-2.1.4-dfsg3/generic/md5/md5.h Examining data/tcltrf-2.1.4-dfsg3/generic/zip_opt.c Examining data/tcltrf-2.1.4-dfsg3/generic/bz2.c Examining data/tcltrf-2.1.4-dfsg3/generic/octcode.c Examining data/tcltrf-2.1.4-dfsg3/generic/digest.c Examining data/tcltrf-2.1.4-dfsg3/generic/bz2_opt.c Examining data/tcltrf-2.1.4-dfsg3/generic/trfStubLib.c Examining data/tcltrf-2.1.4-dfsg3/generic/templates/cvt_template.c Examining data/tcltrf-2.1.4-dfsg3/generic/templates/opt_template.c Examining data/tcltrf-2.1.4-dfsg3/generic/templates/md_template.c Examining data/tcltrf-2.1.4-dfsg3/generic/binio.c Examining data/tcltrf-2.1.4-dfsg3/generic/crc.h Examining data/tcltrf-2.1.4-dfsg3/generic/otpmd5.c Examining data/tcltrf-2.1.4-dfsg3/generic/trfStubInit.c Examining data/tcltrf-2.1.4-dfsg3/generic/sha/appgen.c Examining data/tcltrf-2.1.4-dfsg3/generic/sha/sha_driver.c Examining data/tcltrf-2.1.4-dfsg3/generic/sha/sha.h Examining data/tcltrf-2.1.4-dfsg3/generic/sha/sha.c Examining data/tcltrf-2.1.4-dfsg3/generic/sha.c Examining data/tcltrf-2.1.4-dfsg3/generic/patchlevel.h Examining data/tcltrf-2.1.4-dfsg3/generic/adler.c Examining data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/gflib.c Examining data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c Examining data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/ecc.h Examining data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/ecc.c Examining data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/gf.h Examining data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/version.c Examining data/tcltrf-2.1.4-dfsg3/generic/uucode.c Examining data/tcltrf-2.1.4-dfsg3/generic/crypt.c Examining data/tcltrf-2.1.4-dfsg3/generic/bz2lib.c Examining data/tcltrf-2.1.4-dfsg3/generic/zlib.c Examining data/tcltrf-2.1.4-dfsg3/generic/loadman.c Examining data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/havaltest.c Examining data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/havalapp.h Examining data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c Examining data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.h Examining data/tcltrf-2.1.4-dfsg3/generic/haval.c Examining data/tcltrf-2.1.4-dfsg3/generic/md2d.c Examining data/tcltrf-2.1.4-dfsg3/generic/md2d.h Examining data/tcltrf-2.1.4-dfsg3/generic/loadman.h Examining data/tcltrf-2.1.4-dfsg3/generic/ripemd/rmd128.c Examining data/tcltrf-2.1.4-dfsg3/generic/ripemd/rmd128.h Examining data/tcltrf-2.1.4-dfsg3/generic/ripemd/rmd160.c Examining data/tcltrf-2.1.4-dfsg3/generic/ripemd/rmd160.h Examining data/tcltrf-2.1.4-dfsg3/generic/ripemd/rmdcommon.h Examining data/tcltrf-2.1.4-dfsg3/compat/bzlib.h Examining data/tcltrf-2.1.4-dfsg3/compat/tclLoadMac.c Examining data/tcltrf-2.1.4-dfsg3/compat/tclLoadShl.c Examining data/tcltrf-2.1.4-dfsg3/compat/tclLoadNone.c Examining data/tcltrf-2.1.4-dfsg3/compat/zconf.h Examining data/tcltrf-2.1.4-dfsg3/compat/stdlib.h Examining data/tcltrf-2.1.4-dfsg3/compat/stpncpy.c Examining data/tcltrf-2.1.4-dfsg3/compat/zlib.h Examining data/tcltrf-2.1.4-dfsg3/compat/_eprintf.c Examining data/tcltrf-2.1.4-dfsg3/compat/tclLoadWin.c Examining data/tcltrf-2.1.4-dfsg3/compat/tclLoadDyld.c Examining data/tcltrf-2.1.4-dfsg3/compat/md2.h Examining data/tcltrf-2.1.4-dfsg3/compat/tclLoadDld.c Examining data/tcltrf-2.1.4-dfsg3/compat/dlfcn.h Examining data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c Examining data/tcltrf-2.1.4-dfsg3/compat/sha.h Examining data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c Examining data/tcltrf-2.1.4-dfsg3/app/tclAppInit.c Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclStubs.c Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclStubInit.c Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclDecls.h Examining data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c Examining data/tcltrf-2.1.4-dfsg3/patches/v8.0/tcl.h Examining data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c Examining data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tcl.h Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tcl.h Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclStubs.c Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclStubInit.c Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclDecls.h Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclStubs.c Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclStubInit.c Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclDecls.h Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tcl.h Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclStubLib.c Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c Examining data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tcl.h Examining data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c Examining data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tcl.h FINAL RESULTS: data/tcltrf-2.1.4-dfsg3/compat/_eprintf.c:12:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf (stderr, string, expression, line, filename); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:123:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, strerror(errno)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:127:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mp->name, path); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:137:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, path); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:147:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(errbuf, strerror(errno)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:154:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, strerror(errno)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:164:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, strerror(errno)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:178:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, strerror(errno)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:226:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, p); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:230:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, p); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:234:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, p); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:238:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, p); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:241:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, strerror(atoi(++p))); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:244:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, s); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:267:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, symbol); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:301:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(errbuf, strerror(errno)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:354:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, strerror(errno)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:365:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, strerror(errno)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:374:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, strerror(errno)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:381:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, strerror(errno)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:405:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, strerror(errno)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:442:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, strerror(errno)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:476:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, strerror(errno)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:506:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ep->name, symname); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:533:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, strerror(errno)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:542:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, strerror(errno)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:549:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(errbuf, strerror(errno)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:193:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(Tcl_DStringValue(&fullPath), F_OK) != -1) { data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:332:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (SymbolTableFile, relocatedFileName); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:403:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(msg, errorMessage); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:404:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(msg, err); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:444:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(errorMessage, message); data/tcltrf-2.1.4-dfsg3/compat/tclLoadMac.c:113:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(packageName,pkgGuess); data/tcltrf-2.1.4-dfsg3/compat/tclLoadMac.c:220:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sym1, symbol); data/tcltrf-2.1.4-dfsg3/compat/tclLoadNone.c:71:12: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. extern int crypt (); data/tcltrf-2.1.4-dfsg3/compat/tclLoadNone.c:145:14: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. { "crypt", crypt }, data/tcltrf-2.1.4-dfsg3/generic/crypt.c:96:35: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. res = Tcl_NewStringObj ((char*) crypt (passwd, salt_b), -1); data/tcltrf-2.1.4-dfsg3/generic/crypt.c:174:40: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. res = Tcl_NewStringObj ((char*) md5f.crypt (passwd, salt_b), -1); data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:378:22: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). o->matchFlag = strcpy (ckalloc (1 + strlen (value)), value); data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:394:29: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). o->writeDestination = strcpy (ckalloc (1+strlen (value)), value); data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:412:28: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). o->readDestination = strcpy (ckalloc (1+strlen (value)), value); data/tcltrf-2.1.4-dfsg3/generic/load.c:83:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf,libName); data/tcltrf-2.1.4-dfsg3/generic/load.c:111:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf+1,*q); data/tcltrf-2.1.4-dfsg3/generic/loadman.h:121:18: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. const char* (* crypt) _ANSI_ARGS_ ((const char* key, const char* salt)); data/tcltrf-2.1.4-dfsg3/generic/transformInt.h:137:27: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define PRINT BLNKS; printf data/tcltrf-2.1.4-dfsg3/generic/transformInt.h:139:20: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define NPRINT printf data/tcltrf-2.1.4-dfsg3/generic/transformInt.h:152:23: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define PRINT if (0) printf data/tcltrf-2.1.4-dfsg3/generic/transformInt.h:153:23: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define NPRINT if (0) printf data/tcltrf-2.1.4-dfsg3/md5-crypt/crypt-entry.c:33:24: [4] (crypto) crypt_r: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. # define __crypt_r crypt_r data/tcltrf-2.1.4-dfsg3/md5-crypt/md5c-test.c:11:8: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. cp = crypt ("Hello world!", salt); data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h:52:14: [4] (crypto) crypt_r: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. extern char *crypt_r _ANSI_ARGS_ ((CONST char *__key, CONST char *__salt, data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:1222:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chanPtr->channelName, chanName); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:1416:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (chanPtr->channelName, pt->channelName); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5335:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(esPtr->script, script); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5896:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(esPtr->script, argv[4]); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:1222:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chanPtr->channelName, chanName); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:1416:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (chanPtr->channelName, pt->channelName); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5335:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(esPtr->script, script); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5896:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(esPtr->script, argv[4]); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:1196:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chanPtr->channelName, chanName); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:1375:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (chanPtr->channelName, pt->channelName); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5238:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(esPtr->script, script); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5797:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(esPtr->script, argv[4]); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:1284:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chanPtr->channelName, chanName); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:1531:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (chanPtr->channelName, pt->channelName); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:1271:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chanPtr->channelName, chanName); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:1495:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (chanPtr->channelName, pt->channelName); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:1302:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chanPtr->channelName, chanName); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:1549:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (chanPtr->channelName, pt->channelName); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:1302:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chanPtr->channelName, chanName); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:1549:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (chanPtr->channelName, pt->channelName); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:1284:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chanPtr->channelName, chanName); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:1531:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (chanPtr->channelName, pt->channelName); data/tcltrf-2.1.4-dfsg3/compat/stdlib.h:33:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. extern char * getenv _ANSI_ARGS_((CONST char *name)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:184:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. p = getenv("LD_LIBRARY_PATH"); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:203:3: [3] (tmpfile) tmpnam: Temporary file race condition (CWE-377). tmpnam (relocatedFileName); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:216:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. p = getenv("LD_LIBRARY_PATH"); data/tcltrf-2.1.4-dfsg3/compat/tclLoadWin.c:74:23: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. handle = (VOID *) LoadLibrary(path); data/tcltrf-2.1.4-dfsg3/compat/md2.h:72:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char data[MD2_BLOCK]; data/tcltrf-2.1.4-dfsg3/compat/stdlib.h:27:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). extern int atoi _ANSI_ARGS_((CONST char *string)); data/tcltrf-2.1.4-dfsg3/compat/stdlib.h:28:14: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). extern long atol _ANSI_ARGS_((CONST char *string)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:86:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char errbuf[BUFSIZ]; data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:122:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "calloc: "); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:136:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "dlopen: "); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:138:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(errbuf, ": "); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:145:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tmp[BUFSIZ/sizeof(char *)]; data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:163:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "loadbind: "); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:177:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "loadbind: "); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:220:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch(atoi(s)) { data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:222:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(errbuf, "to many errors"); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:225:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(errbuf, "can't load library"); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:229:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(errbuf, "can't find symbol"); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:233:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(errbuf, "bad RLD"); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:237:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(errbuf, "bad exec format in"); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:241:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). strcat(errbuf, strerror(atoi(++p))); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:266:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "dlsym: undefined symbol "); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:353:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "readExports: "); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:364:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "readExports: "); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:373:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "readExports: "); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:380:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "readExports: "); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:404:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "readExports: "); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:411:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "readExports: bad magic"); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:423:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "readExports: cannot read data section header"); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:430:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "readExports: cannot read loader section header"); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:441:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "readExports: "); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:449:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "readExports: cannot seek to loader section"); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:457:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "readExports: cannot read loader section"); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:475:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "readExports: "); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:490:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpsym[SYMNMLEN+1]; data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:532:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "findMain: "); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:541:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "findMain: "); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:548:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errbuf, "findMain: "); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:148:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char relocatedFileName [L_tmpnam]; data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:241:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (p, "%08lx", (long) startAddress); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:256:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). relocatedFd = open (relocatedFileName, O_RDONLY); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:475:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen (fileName, "rb")) == NULL) { data/tcltrf-2.1.4-dfsg3/compat/tclLoadMac.c:95:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char packageName[255]; data/tcltrf-2.1.4-dfsg3/compat/tclLoadMac.c:128:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy((char *) errName, "file not found"); data/tcltrf-2.1.4-dfsg3/compat/tclLoadMac.c:216:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sym1[255]; data/tcltrf-2.1.4-dfsg3/generic/asc85code.c:133:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf [4]; data/tcltrf-2.1.4-dfsg3/generic/asc85code.c:145:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf [5]; data/tcltrf-2.1.4-dfsg3/generic/asc85code.c:291:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result [5]; data/tcltrf-2.1.4-dfsg3/generic/asc85code.c:355:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result [5]; data/tcltrf-2.1.4-dfsg3/generic/asc85code.c:513:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char result [4]; data/tcltrf-2.1.4-dfsg3/generic/asc85code.c:641:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char result [4]; data/tcltrf-2.1.4-dfsg3/generic/asc85code.c:756:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char quint [6]; data/tcltrf-2.1.4-dfsg3/generic/asc85code.c:799:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char quint [6]; data/tcltrf-2.1.4-dfsg3/generic/b64code.c:128:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf [3]; data/tcltrf-2.1.4-dfsg3/generic/b64code.c:143:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf [4]; data/tcltrf-2.1.4-dfsg3/generic/b64code.c:344:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf [4]; data/tcltrf-2.1.4-dfsg3/generic/b64code.c:415:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf [4]; data/tcltrf-2.1.4-dfsg3/generic/b64code.c:593:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf [3]; data/tcltrf-2.1.4-dfsg3/generic/b64code.c:661:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf [3]; data/tcltrf-2.1.4-dfsg3/generic/bincode.c:331:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer [CHAR_BIT]; data/tcltrf-2.1.4-dfsg3/generic/bincode.c:562:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf [10]; data/tcltrf-2.1.4-dfsg3/generic/bincode.c:565:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "0x%02x", character); data/tcltrf-2.1.4-dfsg3/generic/bincode.c:642:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf [10]; data/tcltrf-2.1.4-dfsg3/generic/bincode.c:645:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "0x%02x", character); data/tcltrf-2.1.4-dfsg3/generic/binio.c:181:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(interp->result, "%d", totalRead); data/tcltrf-2.1.4-dfsg3/generic/binio.c:196:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(interp->result, "%d", totalRead); data/tcltrf-2.1.4-dfsg3/generic/binio.c:228:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer [50]; data/tcltrf-2.1.4-dfsg3/generic/binio.c:262:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf [3]; data/tcltrf-2.1.4-dfsg3/generic/binio.c:435:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%d", packed); data/tcltrf-2.1.4-dfsg3/generic/binio.c:472:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer [50]; /* to hold most of the read information (and its conversion) */ data/tcltrf-2.1.4-dfsg3/generic/binio.c:516:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf [3]; data/tcltrf-2.1.4-dfsg3/generic/binio.c:650:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.i, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:651:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%d", cvt.i); data/tcltrf-2.1.4-dfsg3/generic/binio.c:654:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.li, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:655:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%ld", cvt.li); data/tcltrf-2.1.4-dfsg3/generic/binio.c:662:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.i, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:663:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%o", cvt.i); data/tcltrf-2.1.4-dfsg3/generic/binio.c:666:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.li, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:667:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%lo", cvt.li); data/tcltrf-2.1.4-dfsg3/generic/binio.c:674:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.i, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:675:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%08x", cvt.i); data/tcltrf-2.1.4-dfsg3/generic/binio.c:678:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.li, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:679:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%08lx", cvt.li); data/tcltrf-2.1.4-dfsg3/generic/binio.c:686:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.ui, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:687:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%u", cvt.ui); data/tcltrf-2.1.4-dfsg3/generic/binio.c:690:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.ul, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:691:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%lu", cvt.ul); data/tcltrf-2.1.4-dfsg3/generic/binio.c:697:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.si, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:698:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%d", cvt.si); data/tcltrf-2.1.4-dfsg3/generic/binio.c:703:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.si, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:704:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%o", cvt.si); data/tcltrf-2.1.4-dfsg3/generic/binio.c:709:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.si, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:710:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%04x", cvt.si); data/tcltrf-2.1.4-dfsg3/generic/binio.c:715:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.us, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:716:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%u", cvt.us); data/tcltrf-2.1.4-dfsg3/generic/binio.c:721:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.li, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:722:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%ld", cvt.li); data/tcltrf-2.1.4-dfsg3/generic/binio.c:727:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.ul, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:728:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%lu", cvt.ul); data/tcltrf-2.1.4-dfsg3/generic/binio.c:732:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.c, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:734:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%d", cvt.i); data/tcltrf-2.1.4-dfsg3/generic/binio.c:738:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.uc, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:740:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%u", cvt.ui); data/tcltrf-2.1.4-dfsg3/generic/binio.c:744:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.f, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:745:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%f", cvt.f); data/tcltrf-2.1.4-dfsg3/generic/binio.c:749:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) &cvt.d, (VOID*) buffer, length); data/tcltrf-2.1.4-dfsg3/generic/binio.c:750:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%f", cvt.d); data/tcltrf-2.1.4-dfsg3/generic/binio.c:767:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buffer, "%d", unpacked); data/tcltrf-2.1.4-dfsg3/generic/crypt.c:73:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char salt_b [3]; data/tcltrf-2.1.4-dfsg3/generic/crypt.c:134:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char salt_b [12]; data/tcltrf-2.1.4-dfsg3/generic/digest.c:208:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) md, (VOID*) &mdDefinition, sizeof (Trf_TypeDefinition)); data/tcltrf-2.1.4-dfsg3/generic/digest.c:791:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ( (VOID*) (c->digest_buffer + c->charCount), (VOID*) buffer, bufLen); data/tcltrf-2.1.4-dfsg3/generic/digest.c:837:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) (c->digest_buffer + c->charCount), data/tcltrf-2.1.4-dfsg3/generic/digest.c:960:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) c->digest_buffer, (VOID*) temp, md->digest_size); data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:95:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char padding[128] = { /* constants for padding */ data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:277:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[1024]; data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:279:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((file = fopen (file_name, "rb")) == NULL){ data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:297:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[32], data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:354:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (((unsigned char *)state->block)+rmd_len, str, fill_len); data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:357:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((unsigned char *)state->block, str+i, 128); data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:364:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (((unsigned char *)state->block)+rmd_len, str+i, str_len-i); data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:370:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (&state->remainder[rmd_len], str, fill_len); data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:374:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (state->remainder, str+i, 128); data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:383:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (&state->remainder[rmd_len], str+i, str_len-i); data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:391:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tail[10]; data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.h:83:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char remainder[32*4]; /* unhashed chars (No.<128) */ data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/havaltest.c:84:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char fingerprint[FPTLEN >> 3]; data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/havaltest.c:128:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[BLOCK_SIZE]; data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/havaltest.c:129:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char fingerprint[FPTLEN >> 3]; data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/havaltest.c:170:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char fingerprint[FPTLEN >> 3]; data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/havaltest.c:226:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char str[4] = {'A', 'B', 'C', 'D'}; data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/havaltest.c:237:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static void haval_print (unsigned char fingerprint[FPTLEN >> 3]) data/tcltrf-2.1.4-dfsg3/generic/hexcode.c:302:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer [2]; data/tcltrf-2.1.4-dfsg3/generic/hexcode.c:525:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf [10]; data/tcltrf-2.1.4-dfsg3/generic/hexcode.c:528:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "0x%02x", character); data/tcltrf-2.1.4-dfsg3/generic/hexcode.c:605:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf [10]; data/tcltrf-2.1.4-dfsg3/generic/hexcode.c:608:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "0x%02x", nibble); data/tcltrf-2.1.4-dfsg3/generic/load.c:70:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/tcltrf-2.1.4-dfsg3/generic/load.c:100:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf+length,".sl"); data/tcltrf-2.1.4-dfsg3/generic/md2d.c:42:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char subst[256] = { data/tcltrf-2.1.4-dfsg3/generic/md2d.c:72:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char x[48], L; data/tcltrf-2.1.4-dfsg3/generic/md2d.c:93:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m->state, x, 16); data/tcltrf-2.1.4-dfsg3/generic/md2d.c:106:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m->data + idx, p, 16 - idx); data/tcltrf-2.1.4-dfsg3/generic/md2d.c:119:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m->data + idx, p, len); data/tcltrf-2.1.4-dfsg3/generic/md2d.c:125:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char pad[16]; data/tcltrf-2.1.4-dfsg3/generic/md2d.c:132:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pad, m->checksum, 16); data/tcltrf-2.1.4-dfsg3/generic/md2d.c:135:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(res, m->state, MD2_DIGEST_LENGTH); data/tcltrf-2.1.4-dfsg3/generic/md2d.h:51:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char data[16]; /* stored unalligned data between Update's */ data/tcltrf-2.1.4-dfsg3/generic/md2d.h:52:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char checksum[16]; data/tcltrf-2.1.4-dfsg3/generic/md2d.h:53:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char state[16]; /* lower 16 bytes of X */ data/tcltrf-2.1.4-dfsg3/generic/md5/md5.c:54:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char PADDING[64] = { data/tcltrf-2.1.4-dfsg3/generic/md5/md5.c:155:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[16]; MD5_CTX *mdContext; data/tcltrf-2.1.4-dfsg3/generic/md5/md5.h:64:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char in[64]; /* input buffer */ data/tcltrf-2.1.4-dfsg3/generic/md5/md5.h:69:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void MD5Final _ANSI_ARGS_ ((unsigned char digest[16], MD5_CTX *mdContext)); data/tcltrf-2.1.4-dfsg3/generic/md5dig.c:248:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char result[16]; data/tcltrf-2.1.4-dfsg3/generic/md5dig.c:256:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID *) digest, (VOID *) result, DIGEST_SIZE); data/tcltrf-2.1.4-dfsg3/generic/octcode.c:325:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer [3]; data/tcltrf-2.1.4-dfsg3/generic/octcode.c:544:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf [10]; data/tcltrf-2.1.4-dfsg3/generic/octcode.c:547:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "0x%02x", character); data/tcltrf-2.1.4-dfsg3/generic/octcode.c:623:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf [10]; data/tcltrf-2.1.4-dfsg3/generic/octcode.c:626:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "0x%02x", character); data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:136:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[8]; data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:149:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char words[6][5]; data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:168:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char Wp[2048][4] = { /* THREADING: constant, read-only => safe */ data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:2437:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cp[10]; data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:2457:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (cp, c -> buf, sizeof c -> buf); data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:2466:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[5]; data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:2759:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[9]; data/tcltrf-2.1.4-dfsg3/generic/qpcode.c:140:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[CPERLIN + 8]; data/tcltrf-2.1.4-dfsg3/generic/qpcode.c:160:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char hex2nib[0x80] = { data/tcltrf-2.1.4-dfsg3/generic/qpcode.c:324:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf ((char*) c -> buf, "=%02X", '.'); data/tcltrf-2.1.4-dfsg3/generic/qpcode.c:331:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf ((char*) c -> buf, "=%02Xrom ", 'F'); data/tcltrf-2.1.4-dfsg3/generic/qpcode.c:356:14: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf ((char*) c -> buf + c -> charCount, data/tcltrf-2.1.4-dfsg3/generic/qpcode.c:449:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void) strcpy ((char*) c -> buf + c -> charCount - 1, "=\n\n"); data/tcltrf-2.1.4-dfsg3/generic/qpcode.c:457:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void) strcpy ((char*) c -> buf + c -> charCount, "=\n"); data/tcltrf-2.1.4-dfsg3/generic/registry.c:1259:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char block [2] = {0,0}; data/tcltrf-2.1.4-dfsg3/generic/registry.c:2340:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char policy [20]; data/tcltrf-2.1.4-dfsg3/generic/registry.c:2368:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char policy [20]; data/tcltrf-2.1.4-dfsg3/generic/registry.c:2526:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (tmp, buf, length); data/tcltrf-2.1.4-dfsg3/generic/registry.c:3635:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) buf, (VOID*) r->buf, toRead); data/tcltrf-2.1.4-dfsg3/generic/registry.c:3648:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) buf, (VOID*) r->buf, toRead); data/tcltrf-2.1.4-dfsg3/generic/registry.c:3661:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) buf, (VOID*) r->buf, r->used); data/tcltrf-2.1.4-dfsg3/generic/registry.c:3771:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (r->buf + r->used, buf, toWrite); data/tcltrf-2.1.4-dfsg3/generic/registry.c:4140:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (policy, "identity"); data/tcltrf-2.1.4-dfsg3/generic/registry.c:4151:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (policy, "unseekable"); data/tcltrf-2.1.4-dfsg3/generic/registry.c:4351:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (tmp, bytes, len); data/tcltrf-2.1.4-dfsg3/generic/rmd128.c:212:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) (ctx->buf + ctx->byteCount), (VOID*) buffer, bufLen); data/tcltrf-2.1.4-dfsg3/generic/rmd128.c:224:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) (ctx->buf + ctx->byteCount), (VOID*) buffer, k); data/tcltrf-2.1.4-dfsg3/generic/rmd128.c:254:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) ctx->buf, (VOID*) buffer, bufLen); data/tcltrf-2.1.4-dfsg3/generic/rmd128.c:289:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (digest, ctx->state, DIGEST_SIZE); data/tcltrf-2.1.4-dfsg3/generic/rmd160.c:212:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) (ctx->buf + ctx->byteCount), (VOID*) buffer, bufLen); data/tcltrf-2.1.4-dfsg3/generic/rmd160.c:224:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) (ctx->buf + ctx->byteCount), (VOID*) buffer, k); data/tcltrf-2.1.4-dfsg3/generic/rmd160.c:254:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) ctx->buf, (VOID*) buffer, bufLen); data/tcltrf-2.1.4-dfsg3/generic/rmd160.c:289:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (digest, ctx->state, DIGEST_SIZE); data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/ecc.c:76:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msg[249], coded[255]; data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/ecc.c:107:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msgs[249], cod[255]; data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/ecc.h:29:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char g[6] = data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/gf.h:30:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char e2v[256] = data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/gf.h:48:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char v2e[256] = data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:48:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char m[249], c[255]; data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:52:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char r[6], rtmp; data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:80:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:83:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char p[255], x; data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:108:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char c[255], s[7]; data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:111:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern unsigned char e2v[256]; data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:132:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char s[7], *det; data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:170:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char code[255], mesg[249]; data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:174:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern unsigned char v2e[256]; data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:175:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char syn[7], deter, z[4], e0, e1, e2, n0, n1, n2, w0, w1, w2, data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:322:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char polynom[4], roots[3]; data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/rslib.c:326:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern unsigned char e2v[256]; data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:40:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void rsencode _ANSI_ARGS_ ((unsigned char m [MSG_LEN], data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:41:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char c [CODE_LEN])); data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:42:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void rsdecode _ANSI_ARGS_ ((unsigned char c [CODE_LEN], data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:43:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char m [MSG_LEN], int* errcode)); data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:131:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char block [MSG_LEN]; data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:143:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char block [CODE_LEN]; data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:285:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out [CODE_LEN]; data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:331:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out [CODE_LEN], oldchar; data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:347:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) (c->block + c->charCount), (VOID*) buffer, bufLen); data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:353:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) (c->block + c->charCount), (VOID*) buffer, k); data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:396:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) c->block, (VOID*) buffer, bufLen); data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:442:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out [CODE_LEN]; data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:590:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msg [MSG_LEN]; data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:646:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msg [MSG_LEN]; data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:662:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) (c->block + c->charCount), (VOID*) buffer, bufLen); data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:668:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) (c->block + c->charCount), (VOID*) buffer, k); data/tcltrf-2.1.4-dfsg3/generic/rs_ecc.c:719:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) c->block, (VOID*) buffer, bufLen); data/tcltrf-2.1.4-dfsg3/generic/sha.c:61:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf [CHUNK_SIZE]; /* SHA block */ data/tcltrf-2.1.4-dfsg3/generic/sha.c:211:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) (s->buf + s->count), (VOID*) buffer, bufLen); data/tcltrf-2.1.4-dfsg3/generic/sha.c:223:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) (s->buf + s->count), (VOID*) buffer, k); data/tcltrf-2.1.4-dfsg3/generic/sha.c:240:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) s->buf, (VOID*) buffer, bufLen); data/tcltrf-2.1.4-dfsg3/generic/sha.c:280:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (digest, s->s.digest, SHA_DIGESTSIZE); data/tcltrf-2.1.4-dfsg3/generic/sha/appgen.c:7:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). t = atoi(v[1]); data/tcltrf-2.1.4-dfsg3/generic/sha/sha.c:169:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sha_info->data, buffer, SHA_BLOCKSIZE); data/tcltrf-2.1.4-dfsg3/generic/sha/sha.c:177:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sha_info->data, buffer, count); data/tcltrf-2.1.4-dfsg3/generic/sha/sha_driver.c:20:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fin = fopen(*(++argv), "rb"); data/tcltrf-2.1.4-dfsg3/generic/sha1.c:224:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID *) digest, (VOID *) result, DIGEST_SIZE); data/tcltrf-2.1.4-dfsg3/generic/templates/md_template.c:182:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) (s->buf + s->count), (VOID*) buffer, bufLen); data/tcltrf-2.1.4-dfsg3/generic/templates/md_template.c:194:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) (s->buf + s->count), (VOID*) buffer, k); data/tcltrf-2.1.4-dfsg3/generic/templates/md_template.c:211:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((VOID*) s->buf, (VOID*) buffer, bufLen); data/tcltrf-2.1.4-dfsg3/generic/util.c:70:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf [3]; data/tcltrf-2.1.4-dfsg3/generic/util.c:74:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (buf, in, length); data/tcltrf-2.1.4-dfsg3/generic/util.c:358:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (buffer, mask, length); data/tcltrf-2.1.4-dfsg3/generic/uucode.c:127:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf [3]; data/tcltrf-2.1.4-dfsg3/generic/uucode.c:139:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf [4]; data/tcltrf-2.1.4-dfsg3/generic/uucode.c:338:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf [4]; data/tcltrf-2.1.4-dfsg3/generic/uucode.c:382:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf [4]; data/tcltrf-2.1.4-dfsg3/generic/uucode.c:550:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf [3]; data/tcltrf-2.1.4-dfsg3/generic/uucode.c:618:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf [3]; data/tcltrf-2.1.4-dfsg3/md5-crypt/md5-crypt.c:59:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char b64t[64] = data/tcltrf-2.1.4-dfsg3/md5-crypt/md5-crypt.c:79:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char alt_result[16]; data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:39:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy(d, s, n) bcopy ((s), (d), (n)) data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:39:27: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy(d, s, n) bcopy ((s), (d), (n)) data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:72:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char fillbuf[64] = { 0x80, 0 /* , 0, 0, ... */ }; data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:128:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (&ctx->buffer[bytes], fillbuf, pad); data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:152:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BLOCKSIZE + 72]; data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:233:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (&ctx->buffer[left_over], buffer, add); data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:240:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (ctx->buffer, &ctx->buffer[(left_over + add) & ~63], data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:251:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctx->buffer, buffer, 64); data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.c:268:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (ctx->buffer, buffer, len); data/tcltrf-2.1.4-dfsg3/md5-crypt/md5.h:90:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[128]; data/tcltrf-2.1.4-dfsg3/md5-crypt/md5test.c:7:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char result[16]; data/tcltrf-2.1.4-dfsg3/md5-crypt/md5test.c:32:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sum[16]; data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h:37:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keysched[16 * 8]; data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h:38:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sb0[32768]; data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h:39:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sb1[32768]; data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h:40:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sb2[32768]; data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h:41:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sb3[32768]; data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h:43:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char crypt_3_buf[14]; data/tcltrf-2.1.4-dfsg3/md5-crypt/trf_crypt.h:44:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char current_salt[2]; data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tcl.h:642:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char staticSpace[TCL_DSTRING_STATIC_SIZE]; data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tcl.h:791:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[4]; /* String for key. The actual size data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:53:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1]; /* Copy buffer, this must be the last data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:71:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; /* Placeholder for real buffer. The real data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:2467:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) destPtr, (VOID *) srcPtr, (size_t) destCopied); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:2471:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) destPtr, (VOID *) srcPtr, (size_t) destCopied); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:2831:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:2849:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4305:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[sizeof(short)]; data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4341:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char optionVal[128]; /* Buffer for sprintf. */ data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4445:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4447:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c", chanPtr->inEofChar); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4455:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4457:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c", chanPtr->outEofChar); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4626:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). chanPtr->bufSize = atoi(newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5544:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; /* For sprintf. */ data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5681:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d", IOQueued); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5747:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d", IOQueued); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5789:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d", chanPtr->refCount); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tcl.h:649:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char staticSpace[TCL_DSTRING_STATIC_SIZE]; data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tcl.h:806:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[4]; /* String for key. The actual size data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:53:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1]; /* Copy buffer, this must be the last data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:71:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; /* Placeholder for real buffer. The real data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:2467:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) destPtr, (VOID *) srcPtr, (size_t) destCopied); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:2471:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) destPtr, (VOID *) srcPtr, (size_t) destCopied); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:2831:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:2849:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4305:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[sizeof(short)]; data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4341:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char optionVal[128]; /* Buffer for sprintf. */ data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4445:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4447:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c", chanPtr->inEofChar); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4455:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4457:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c", chanPtr->outEofChar); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4626:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). chanPtr->bufSize = atoi(newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5544:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; /* For sprintf. */ data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5681:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d", IOQueued); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5747:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d", IOQueued); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5789:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d", chanPtr->refCount); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tcl.h:576:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char staticSpace[TCL_DSTRING_STATIC_SIZE]; data/tcltrf-2.1.4-dfsg3/patches/v8.0/tcl.h:725:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[4]; /* String for key. The actual size data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:52:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1]; /* Copy buffer, this must be the last data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:70:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; /* Placeholder for real buffer. The real data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:2410:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) destPtr, (VOID *) srcPtr, (size_t) destCopied); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:2414:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) destPtr, (VOID *) srcPtr, (size_t) destCopied); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:2774:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:2792:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4214:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[sizeof(short)]; data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4250:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char optionVal[128]; /* Buffer for sprintf. */ data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4354:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4356:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c", chanPtr->inEofChar); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4364:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4366:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c", chanPtr->outEofChar); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4535:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). chanPtr->bufSize = atoi(newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5447:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; /* For sprintf. */ data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5584:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d", IOQueued); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5650:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d", IOQueued); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5692:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d", chanPtr->refCount); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:53:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1]; /* Copy buffer, this must be the last data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:71:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; /* Placeholder for real buffer. The real data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:2768:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char safe[BUFFER_PADDING]; data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:2842:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dst, (VOID *) safe, (size_t) saved); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:2877:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) safe, (VOID *) (dst + dstLen), (size_t) saved); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:3292:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[1 + TCL_UTF_MAX]; data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:3598:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) (nextPtr->buf + BUFFER_PADDING - extra), data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:3743:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) (bufPtr->buf + bufPtr->nextAdded), data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:4186:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) (nextPtr->buf + nextPtr->nextRemoved), (VOID *) src, data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:4311:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:4320:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5307:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char optionVal[128]; /* Buffer for sprintf. */ data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5413:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5415:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c", chanPtr->inEofChar); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5423:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5425:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c", chanPtr->outEofChar); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5590:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). chanPtr->bufSize = atoi(newValue); /* INTL: "C", UTF safe. */ data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:6519:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[TCL_INTEGER_SPACE];/* For sprintf. */ data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:7459:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:7481:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:7520:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:7563:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:7718:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:7722:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tcl.h:502:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resultSpace[TCL_RESULT_SIZE+1]; data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tcl.h:616:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char staticSpace[TCL_DSTRING_STATIC_SIZE]; data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tcl.h:787:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[4]; /* String for key. The actual size data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:52:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1]; /* Copy buffer, this must be the last data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:70:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; /* Placeholder for real buffer. The real data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:2706:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char safe[BUFFER_PADDING]; data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:2780:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dst, (VOID *) safe, (size_t) saved); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:2815:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) safe, (VOID *) (dst + dstLen), (size_t) saved); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:2892:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dst, (VOID *) src, (size_t) srcLen); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:2909:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dst, (VOID *) src, (size_t) srcLen); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:3227:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[1 + TCL_UTF_MAX]; data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:3522:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) (nextPtr->buf + BUFFER_PADDING - extra), data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:3667:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) (bufPtr->buf + bufPtr->nextAdded), data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:4100:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) (nextPtr->buf + nextPtr->nextRemoved), (VOID *) src, data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:4225:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:4234:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5235:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[sizeof(short)]; data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5271:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char optionVal[128]; /* Buffer for sprintf. */ data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5394:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5396:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c", chanPtr->inEofChar); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5404:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5406:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c", chanPtr->outEofChar); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5571:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). chanPtr->bufSize = atoi(newValue); /* INTL: "C", UTF safe. */ data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:6540:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[TCL_INTEGER_SPACE];/* For sprintf. */ data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:7471:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:7493:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:7532:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:7575:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:7730:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:7734:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tcl.h:566:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resultSpace[TCL_RESULT_SIZE+1]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tcl.h:680:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char staticSpace[TCL_DSTRING_STATIC_SIZE]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tcl.h:851:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[4]; /* String for key. The actual size data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:53:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1]; /* Copy buffer, this must be the last data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:71:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; /* Placeholder for real buffer. The real data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:1289:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[sizeof(short)]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:2786:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char safe[BUFFER_PADDING]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:2860:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dst, (VOID *) safe, (size_t) saved); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:2895:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) safe, (VOID *) (dst + dstLen), (size_t) saved); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:3310:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[1 + TCL_UTF_MAX]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:3616:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) (nextPtr->buf + BUFFER_PADDING - extra), data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:3761:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) (bufPtr->buf + bufPtr->nextAdded), data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:4204:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) (nextPtr->buf + nextPtr->nextRemoved), (VOID *) src, data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:4329:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:4338:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5357:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char optionVal[128]; /* Buffer for sprintf. */ data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5482:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5484:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c", chanPtr->inEofChar); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5492:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5494:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c", chanPtr->outEofChar); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5659:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). chanPtr->bufSize = atoi(newValue); /* INTL: "C", UTF safe. */ data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:6622:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[TCL_INTEGER_SPACE];/* For sprintf. */ data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:7562:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:7584:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:7623:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:7666:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:7821:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:7825:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tcl.h:600:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resultSpace[TCL_RESULT_SIZE+1]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tcl.h:714:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char staticSpace[TCL_DSTRING_STATIC_SIZE]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tcl.h:884:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[4]; /* String for key. The actual size data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:53:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1]; /* Copy buffer, this must be the last data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:71:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; /* Placeholder for real buffer. The real data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:1289:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[sizeof(short)]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:2786:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char safe[BUFFER_PADDING]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:2860:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dst, (VOID *) safe, (size_t) saved); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:2895:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) safe, (VOID *) (dst + dstLen), (size_t) saved); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:3310:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[1 + TCL_UTF_MAX]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:3616:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) (nextPtr->buf + BUFFER_PADDING - extra), data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:3761:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) (bufPtr->buf + bufPtr->nextAdded), data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:4204:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) (nextPtr->buf + nextPtr->nextRemoved), (VOID *) src, data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:4329:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:4338:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5357:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char optionVal[128]; /* Buffer for sprintf. */ data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5482:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5484:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c", chanPtr->inEofChar); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5492:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5494:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c", chanPtr->outEofChar); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5659:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). chanPtr->bufSize = atoi(newValue); /* INTL: "C", UTF safe. */ data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:6622:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[TCL_INTEGER_SPACE];/* For sprintf. */ data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:7562:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:7584:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:7623:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:7666:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:7821:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:7825:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:53:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1]; /* Copy buffer, this must be the last data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:71:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; /* Placeholder for real buffer. The real data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:2768:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char safe[BUFFER_PADDING]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:2842:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dst, (VOID *) safe, (size_t) saved); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:2877:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) safe, (VOID *) (dst + dstLen), (size_t) saved); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:3292:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[1 + TCL_UTF_MAX]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:3598:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) (nextPtr->buf + BUFFER_PADDING - extra), data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:3743:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) (bufPtr->buf + bufPtr->nextAdded), data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:4186:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) (nextPtr->buf + nextPtr->nextRemoved), (VOID *) src, data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:4311:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:4320:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) dstStart, (VOID *) srcStart, (size_t) dstLen); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5307:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char optionVal[128]; /* Buffer for sprintf. */ data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5413:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5415:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c", chanPtr->inEofChar); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5423:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5425:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c", chanPtr->outEofChar); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5590:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). chanPtr->bufSize = atoi(newValue); /* INTL: "C", UTF safe. */ data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:6518:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[TCL_INTEGER_SPACE];/* For sprintf. */ data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:7458:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:7480:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:7519:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:7562:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) result, data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:7717:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:7721:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((VOID *) destPtr, (VOID *) src, (size_t) destCopied); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:126:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mp->name = malloc((unsigned) (strlen(path) + 1)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:501:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmpsym, ls->l_name, SYMNMLEN); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAix.c:505:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ep->name = malloc((unsigned) (strlen(symname) + 1)); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:260:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). status= read (relocatedFd, (char *) & relocatedHead, sizeof relocatedHead); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:308:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read (relocatedFd, startAddress, relocatedSize) < relocatedSize) { data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:331:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SymbolTableFile = ckalloc (strlen (relocatedFileName) + 1); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:402:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). msg = ckalloc(strlen(errorMessage)+strlen(err)+1); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:402:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). msg = ckalloc(strlen(errorMessage)+strlen(err)+1); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:443:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). errorMessage = ckalloc(strlen(message)+1); data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:483:29: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (*p != '\0' && (c = getc (f)) != EOF) { data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:505:15: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getc (f)) != '\0' && c != EOF) { data/tcltrf-2.1.4-dfsg3/compat/tclLoadAout.c:593:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r += strlen(r) - (p-pkgGuess); data/tcltrf-2.1.4-dfsg3/compat/tclLoadMac.c:126:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). err = FSpLocationFromPath(strlen(path), (char *) path, &fileSpec); data/tcltrf-2.1.4-dfsg3/compat/tclLoadShl.c:48:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(path); data/tcltrf-2.1.4-dfsg3/generic/binio.c:412:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bufLen = strlen (argv [0]); data/tcltrf-2.1.4-dfsg3/generic/binio.c:939:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (argv [1]); data/tcltrf-2.1.4-dfsg3/generic/bz2_opt.c:245:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen (optname + 1); data/tcltrf-2.1.4-dfsg3/generic/bz2_opt.c:254:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (value); data/tcltrf-2.1.4-dfsg3/generic/bz2_opt.c:286:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (value); data/tcltrf-2.1.4-dfsg3/generic/convert.c:235:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (optname+1); data/tcltrf-2.1.4-dfsg3/generic/convert.c:243:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (value); data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:360:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen (optname); data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:378:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). o->matchFlag = strcpy (ckalloc (1 + strlen (value)), value); data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:394:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). o->writeDestination = strcpy (ckalloc (1+strlen (value)), value); data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:412:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). o->readDestination = strcpy (ckalloc (1+strlen (value)), value); data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:490:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen (typeString); data/tcltrf-2.1.4-dfsg3/generic/dig_opt.c:543:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen (modeString); data/tcltrf-2.1.4-dfsg3/generic/digest.c:1056:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Tcl_Obj* varName = Tcl_NewStringObj (destHandle, strlen (destHandle)); data/tcltrf-2.1.4-dfsg3/generic/haval-1.1/haval.c:264:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unsigned int len = strlen (string); data/tcltrf-2.1.4-dfsg3/generic/load.c:82:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(libName); data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:2474:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = c -> write (c -> writeClientData, (unsigned char*) buf, strlen (buf), data/tcltrf-2.1.4-dfsg3/generic/otpcode.c:2788:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (w) < 4) data/tcltrf-2.1.4-dfsg3/generic/ref_opt.c:259:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (optname+1); data/tcltrf-2.1.4-dfsg3/generic/ref_opt.c:267:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (value); data/tcltrf-2.1.4-dfsg3/generic/registry.c:832:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (option); data/tcltrf-2.1.4-dfsg3/generic/registry.c:1439:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int gotBytes, read, i, res, copied, maxRead; data/tcltrf-2.1.4-dfsg3/generic/registry.c:1542:34: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). PRINT ("Retrieved = %d {\n", read); data/tcltrf-2.1.4-dfsg3/generic/registry.c:1543:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). DUMP (read, buf); data/tcltrf-2.1.4-dfsg3/generic/registry.c:1545:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). STREAM_IN (trans, read, buf); data/tcltrf-2.1.4-dfsg3/generic/registry.c:1547:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read < 0) { data/tcltrf-2.1.4-dfsg3/generic/registry.c:1652:35: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (unsigned char*) buf, read, data/tcltrf-2.1.4-dfsg3/generic/registry.c:1659:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). for (i=0; i < read; i++) { data/tcltrf-2.1.4-dfsg3/generic/registry.c:1678:33: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). trans->seekState.downLoc += read; data/tcltrf-2.1.4-dfsg3/generic/registry.c:1681:40: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). trans->seekState.aheadOffset += (read % trans->seekState.used.numBytesDown); data/tcltrf-2.1.4-dfsg3/generic/registry.c:4157:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy (policy, ""); data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/ecc.c:111:10: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (getc (stdin) == 71) data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/ecc.c:115:11: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). cod[i] = getc (stdin); data/tcltrf-2.1.4-dfsg3/generic/rs-ecc/ecc.c:129:7: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (getc (stdin) != EOF) data/tcltrf-2.1.4-dfsg3/generic/templates/opt_template.c:224:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen (optname + 1); data/tcltrf-2.1.4-dfsg3/generic/zip_opt.c:248:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen (optname + 1); data/tcltrf-2.1.4-dfsg3/generic/zip_opt.c:258:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (value); data/tcltrf-2.1.4-dfsg3/generic/zip_opt.c:289:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (value); data/tcltrf-2.1.4-dfsg3/generic/zip_opt.c:322:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (value); data/tcltrf-2.1.4-dfsg3/md5-crypt/md5-crypt.c:94:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key_len = strlen (key); data/tcltrf-2.1.4-dfsg3/md5-crypt/md5-crypt.c:240:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int needed = 3 + strlen (salt) + 1 + 26 + 1; data/tcltrf-2.1.4-dfsg3/md5-crypt/md5test.c:39:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). md5_process_bytes (tests[cnt].input, strlen (tests[cnt].input), &ctx); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:1221:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chanPtr->channelName = ckalloc((unsigned) (strlen(chanName) + 1)); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:1415:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chanPtr->channelName = (char *) ckalloc (strlen(pt->channelName)+1); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:2376:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(srcPtr); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4376:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optionName); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4584:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optionName); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4601:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:4638:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nv_len = strlen (newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5334:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). esPtr->script = ckalloc((unsigned) (strlen(script) + 1)); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5448:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(argv[2]); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5552:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmdName); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5868:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmd); data/tcltrf-2.1.4-dfsg3/patches/v8.0.4/tclIO.c:5895:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). esPtr->script = ckalloc((unsigned) (strlen(argv[4]) + 1)); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:1221:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chanPtr->channelName = ckalloc((unsigned) (strlen(chanName) + 1)); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:1415:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chanPtr->channelName = (char *) ckalloc (strlen(pt->channelName)+1); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:2376:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(srcPtr); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4376:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optionName); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4584:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optionName); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4601:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:4638:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nv_len = strlen (newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5334:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). esPtr->script = ckalloc((unsigned) (strlen(script) + 1)); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5448:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(argv[2]); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5552:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmdName); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5868:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmd); data/tcltrf-2.1.4-dfsg3/patches/v8.0.5/tclIO.c:5895:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). esPtr->script = ckalloc((unsigned) (strlen(argv[4]) + 1)); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:1195:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chanPtr->channelName = ckalloc((unsigned) (strlen(chanName) + 1)); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:1374:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chanPtr->channelName = (char *) ckalloc (strlen(pt->channelName)+1); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:2319:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(srcPtr); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4285:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optionName); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4493:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optionName); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4510:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:4547:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nv_len = strlen (newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5237:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). esPtr->script = ckalloc((unsigned) (strlen(script) + 1)); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5351:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(argv[2]); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5455:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmdName); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5771:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmd); data/tcltrf-2.1.4-dfsg3/patches/v8.0/tclIO.c:5796:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). esPtr->script = ckalloc((unsigned) (strlen(argv[4]) + 1)); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:1283:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chanPtr->channelName = ckalloc((unsigned) (strlen(chanName) + 1)); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:1530:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chanPtr->channelName = (char *) ckalloc (strlen(pt->channelName)+1); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:2541:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). srcLen = strlen(src); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:2582:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(src); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:3505:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read: data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:3589:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). goto read; data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5342:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optionName); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5552:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optionName); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:5567:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:6527:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmdName); data/tcltrf-2.1.4-dfsg3/patches/v8.1/tclIO.c:6846:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmd); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:1270:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chanPtr->channelName = ckalloc((unsigned) (strlen(chanName) + 1)); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:1494:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chanPtr->channelName = (char *) ckalloc (strlen(pt->channelName)+1); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:2480:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). srcLen = strlen(src); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:2521:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(src); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:3429:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read: data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:3513:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). goto read; data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5306:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optionName); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5533:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optionName); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5548:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:5581:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nv_len = strlen (newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:6548:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmdName); data/tcltrf-2.1.4-dfsg3/patches/v8.1a2/tclIO.c:6867:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmd); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:1301:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chanPtr->channelName = ckalloc((unsigned) (strlen(chanName) + 1)); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:1548:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chanPtr->channelName = (char *) ckalloc (strlen(pt->channelName)+1); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:2559:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). srcLen = strlen(src); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:2600:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(src); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:3523:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read: data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:3607:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). goto read; data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5392:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optionName); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5621:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optionName); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5636:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:5671:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nv_len = strlen (newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:6630:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmdName); data/tcltrf-2.1.4-dfsg3/patches/v8.1b1/tclIO.c:6949:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmd); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:1301:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chanPtr->channelName = ckalloc((unsigned) (strlen(chanName) + 1)); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:1548:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chanPtr->channelName = (char *) ckalloc (strlen(pt->channelName)+1); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:2559:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). srcLen = strlen(src); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:2600:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(src); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:3523:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read: data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:3607:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). goto read; data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5392:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optionName); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5621:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optionName); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5636:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:5671:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nv_len = strlen (newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:6630:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmdName); data/tcltrf-2.1.4-dfsg3/patches/v8.1b2/tclIO.c:6949:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmd); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:1283:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chanPtr->channelName = ckalloc((unsigned) (strlen(chanName) + 1)); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:1530:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chanPtr->channelName = (char *) ckalloc (strlen(pt->channelName)+1); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:2541:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). srcLen = strlen(src); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:2582:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(src); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:3505:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read: data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:3589:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). goto read; data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5342:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optionName); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5552:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optionName); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:5567:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(newValue); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:6526:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmdName); data/tcltrf-2.1.4-dfsg3/patches/v8.1b3/tclIO.c:6845:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cmd); ANALYSIS SUMMARY: Hits = 686 Lines analyzed = 126987 in approximately 3.02 seconds (42106 lines/second) Physical Source Lines of Code (SLOC) = 73148 Hits@level = [0] 82 [1] 150 [2] 458 [3] 5 [4] 73 [5] 0 Hits@level+ = [0+] 768 [1+] 686 [2+] 536 [3+] 78 [4+] 73 [5+] 0 Hits/KSLOC@level+ = [0+] 10.4993 [1+] 9.37825 [2+] 7.32761 [3+] 1.06633 [4+] 0.997977 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.