Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/tinydyndns-0.4.2.debian1/alloc.c Examining data/tinydyndns-0.4.2.debian1/alloc.h Examining data/tinydyndns-0.4.2.debian1/alloc_re.c Examining data/tinydyndns-0.4.2.debian1/auto-str.c Examining data/tinydyndns-0.4.2.debian1/auto_home.h Examining data/tinydyndns-0.4.2.debian1/axfr-get.c Examining data/tinydyndns-0.4.2.debian1/axfrdns-conf.c Examining data/tinydyndns-0.4.2.debian1/axfrdns.c Examining data/tinydyndns-0.4.2.debian1/buffer.c Examining data/tinydyndns-0.4.2.debian1/buffer.h Examining data/tinydyndns-0.4.2.debian1/buffer_1.c Examining data/tinydyndns-0.4.2.debian1/buffer_2.c Examining data/tinydyndns-0.4.2.debian1/buffer_copy.c Examining data/tinydyndns-0.4.2.debian1/buffer_get.c Examining data/tinydyndns-0.4.2.debian1/buffer_put.c Examining data/tinydyndns-0.4.2.debian1/buffer_read.c Examining data/tinydyndns-0.4.2.debian1/buffer_write.c Examining data/tinydyndns-0.4.2.debian1/byte.h Examining data/tinydyndns-0.4.2.debian1/byte_chr.c Examining data/tinydyndns-0.4.2.debian1/byte_copy.c Examining data/tinydyndns-0.4.2.debian1/byte_cr.c Examining data/tinydyndns-0.4.2.debian1/byte_diff.c Examining data/tinydyndns-0.4.2.debian1/byte_zero.c Examining data/tinydyndns-0.4.2.debian1/cache.c Examining data/tinydyndns-0.4.2.debian1/cache.h Examining data/tinydyndns-0.4.2.debian1/cachetest.c Examining data/tinydyndns-0.4.2.debian1/case.h Examining data/tinydyndns-0.4.2.debian1/case_diffb.c Examining data/tinydyndns-0.4.2.debian1/case_diffs.c Examining data/tinydyndns-0.4.2.debian1/case_lowerb.c Examining data/tinydyndns-0.4.2.debian1/cdb.c Examining data/tinydyndns-0.4.2.debian1/cdb.h Examining data/tinydyndns-0.4.2.debian1/cdb_hash.c Examining data/tinydyndns-0.4.2.debian1/cdb_make.c Examining data/tinydyndns-0.4.2.debian1/cdb_make.h Examining data/tinydyndns-0.4.2.debian1/chkshsgr.c Examining data/tinydyndns-0.4.2.debian1/dd.c Examining data/tinydyndns-0.4.2.debian1/dd.h Examining data/tinydyndns-0.4.2.debian1/dns.h Examining data/tinydyndns-0.4.2.debian1/dns_dfd.c Examining data/tinydyndns-0.4.2.debian1/dns_domain.c Examining data/tinydyndns-0.4.2.debian1/dns_dtda.c Examining data/tinydyndns-0.4.2.debian1/dns_ip.c Examining data/tinydyndns-0.4.2.debian1/dns_ipq.c Examining data/tinydyndns-0.4.2.debian1/dns_mx.c Examining data/tinydyndns-0.4.2.debian1/dns_name.c Examining data/tinydyndns-0.4.2.debian1/dns_nd.c Examining data/tinydyndns-0.4.2.debian1/dns_packet.c Examining data/tinydyndns-0.4.2.debian1/dns_random.c Examining data/tinydyndns-0.4.2.debian1/dns_rcip.c Examining data/tinydyndns-0.4.2.debian1/dns_rcrw.c Examining data/tinydyndns-0.4.2.debian1/dns_resolve.c Examining data/tinydyndns-0.4.2.debian1/dns_sortip.c Examining data/tinydyndns-0.4.2.debian1/dns_transmit.c Examining data/tinydyndns-0.4.2.debian1/dns_txt.c Examining data/tinydyndns-0.4.2.debian1/dnscache-conf.c Examining data/tinydyndns-0.4.2.debian1/dnscache.c Examining data/tinydyndns-0.4.2.debian1/dnsfilter.c Examining data/tinydyndns-0.4.2.debian1/dnsip.c Examining data/tinydyndns-0.4.2.debian1/dnsipq.c Examining data/tinydyndns-0.4.2.debian1/dnsmx.c Examining data/tinydyndns-0.4.2.debian1/dnsname.c Examining data/tinydyndns-0.4.2.debian1/dnsq.c Examining data/tinydyndns-0.4.2.debian1/dnsqr.c Examining data/tinydyndns-0.4.2.debian1/dnstrace.c Examining data/tinydyndns-0.4.2.debian1/dnstxt.c Examining data/tinydyndns-0.4.2.debian1/droproot.c Examining data/tinydyndns-0.4.2.debian1/droproot.h Examining data/tinydyndns-0.4.2.debian1/env.c Examining data/tinydyndns-0.4.2.debian1/env.h Examining data/tinydyndns-0.4.2.debian1/error.c Examining data/tinydyndns-0.4.2.debian1/error.h Examining data/tinydyndns-0.4.2.debian1/error_str.c Examining data/tinydyndns-0.4.2.debian1/exit.h Examining data/tinydyndns-0.4.2.debian1/fmt.h Examining data/tinydyndns-0.4.2.debian1/fmt_ulong.c Examining data/tinydyndns-0.4.2.debian1/gen_alloc.h Examining data/tinydyndns-0.4.2.debian1/gen_allocdefs.h Examining data/tinydyndns-0.4.2.debian1/generic-conf.c Examining data/tinydyndns-0.4.2.debian1/generic-conf.h Examining data/tinydyndns-0.4.2.debian1/getln.c Examining data/tinydyndns-0.4.2.debian1/getln.h Examining data/tinydyndns-0.4.2.debian1/getln2.c Examining data/tinydyndns-0.4.2.debian1/hier.c Examining data/tinydyndns-0.4.2.debian1/install.c Examining data/tinydyndns-0.4.2.debian1/instcheck.c Examining data/tinydyndns-0.4.2.debian1/iopause.c Examining data/tinydyndns-0.4.2.debian1/ip4.h Examining data/tinydyndns-0.4.2.debian1/ip4_fmt.c Examining data/tinydyndns-0.4.2.debian1/ip4_scan.c Examining data/tinydyndns-0.4.2.debian1/log.c Examining data/tinydyndns-0.4.2.debian1/log.h Examining data/tinydyndns-0.4.2.debian1/ndelay.h Examining data/tinydyndns-0.4.2.debian1/ndelay_off.c Examining data/tinydyndns-0.4.2.debian1/ndelay_on.c Examining data/tinydyndns-0.4.2.debian1/okclient.c Examining data/tinydyndns-0.4.2.debian1/okclient.h Examining data/tinydyndns-0.4.2.debian1/open.h Examining data/tinydyndns-0.4.2.debian1/open_read.c Examining data/tinydyndns-0.4.2.debian1/open_trunc.c Examining data/tinydyndns-0.4.2.debian1/openreadclose.c Examining data/tinydyndns-0.4.2.debian1/openreadclose.h Examining data/tinydyndns-0.4.2.debian1/parsetype.c Examining data/tinydyndns-0.4.2.debian1/parsetype.h Examining data/tinydyndns-0.4.2.debian1/pickdns-conf.c Examining data/tinydyndns-0.4.2.debian1/pickdns-data.c Examining data/tinydyndns-0.4.2.debian1/pickdns.c Examining data/tinydyndns-0.4.2.debian1/printpacket.c Examining data/tinydyndns-0.4.2.debian1/printpacket.h Examining data/tinydyndns-0.4.2.debian1/printrecord.c Examining data/tinydyndns-0.4.2.debian1/printrecord.h Examining data/tinydyndns-0.4.2.debian1/prot.c Examining data/tinydyndns-0.4.2.debian1/prot.h Examining data/tinydyndns-0.4.2.debian1/qlog.c Examining data/tinydyndns-0.4.2.debian1/qlog.h Examining data/tinydyndns-0.4.2.debian1/query.c Examining data/tinydyndns-0.4.2.debian1/query.h Examining data/tinydyndns-0.4.2.debian1/random-ip.c Examining data/tinydyndns-0.4.2.debian1/rbldns-conf.c Examining data/tinydyndns-0.4.2.debian1/rbldns-data.c Examining data/tinydyndns-0.4.2.debian1/rbldns.c Examining data/tinydyndns-0.4.2.debian1/readclose.c Examining data/tinydyndns-0.4.2.debian1/readclose.h Examining data/tinydyndns-0.4.2.debian1/response.c Examining data/tinydyndns-0.4.2.debian1/response.h Examining data/tinydyndns-0.4.2.debian1/roots.c Examining data/tinydyndns-0.4.2.debian1/roots.h Examining data/tinydyndns-0.4.2.debian1/scan.h Examining data/tinydyndns-0.4.2.debian1/scan_ulong.c Examining data/tinydyndns-0.4.2.debian1/seek.h Examining data/tinydyndns-0.4.2.debian1/seek_set.c Examining data/tinydyndns-0.4.2.debian1/server.c Examining data/tinydyndns-0.4.2.debian1/sgetopt.c Examining data/tinydyndns-0.4.2.debian1/sgetopt.h Examining data/tinydyndns-0.4.2.debian1/socket.h Examining data/tinydyndns-0.4.2.debian1/socket_accept.c Examining data/tinydyndns-0.4.2.debian1/socket_bind.c Examining data/tinydyndns-0.4.2.debian1/socket_conn.c Examining data/tinydyndns-0.4.2.debian1/socket_listen.c Examining data/tinydyndns-0.4.2.debian1/socket_recv.c Examining data/tinydyndns-0.4.2.debian1/socket_send.c Examining data/tinydyndns-0.4.2.debian1/socket_tcp.c Examining data/tinydyndns-0.4.2.debian1/socket_udp.c Examining data/tinydyndns-0.4.2.debian1/str.h Examining data/tinydyndns-0.4.2.debian1/str_chr.c Examining data/tinydyndns-0.4.2.debian1/str_diff.c Examining data/tinydyndns-0.4.2.debian1/str_len.c Examining data/tinydyndns-0.4.2.debian1/str_rchr.c Examining data/tinydyndns-0.4.2.debian1/str_start.c Examining data/tinydyndns-0.4.2.debian1/stralloc.h Examining data/tinydyndns-0.4.2.debian1/stralloc_cat.c Examining data/tinydyndns-0.4.2.debian1/stralloc_catb.c Examining data/tinydyndns-0.4.2.debian1/stralloc_cats.c Examining data/tinydyndns-0.4.2.debian1/stralloc_copy.c Examining data/tinydyndns-0.4.2.debian1/stralloc_eady.c Examining data/tinydyndns-0.4.2.debian1/stralloc_num.c Examining data/tinydyndns-0.4.2.debian1/stralloc_opyb.c Examining data/tinydyndns-0.4.2.debian1/stralloc_opys.c Examining data/tinydyndns-0.4.2.debian1/stralloc_pend.c Examining data/tinydyndns-0.4.2.debian1/strerr.h Examining data/tinydyndns-0.4.2.debian1/strerr_die.c Examining data/tinydyndns-0.4.2.debian1/strerr_sys.c Examining data/tinydyndns-0.4.2.debian1/subgetopt.c Examining data/tinydyndns-0.4.2.debian1/subgetopt.h Examining data/tinydyndns-0.4.2.debian1/tai.h Examining data/tinydyndns-0.4.2.debian1/tai_add.c Examining data/tinydyndns-0.4.2.debian1/tai_now.c Examining data/tinydyndns-0.4.2.debian1/tai_pack.c Examining data/tinydyndns-0.4.2.debian1/tai_sub.c Examining data/tinydyndns-0.4.2.debian1/tai_uint.c Examining data/tinydyndns-0.4.2.debian1/tai_unpack.c Examining data/tinydyndns-0.4.2.debian1/taia.h Examining data/tinydyndns-0.4.2.debian1/taia_add.c Examining data/tinydyndns-0.4.2.debian1/taia_approx.c Examining data/tinydyndns-0.4.2.debian1/taia_frac.c Examining data/tinydyndns-0.4.2.debian1/taia_less.c Examining data/tinydyndns-0.4.2.debian1/taia_now.c Examining data/tinydyndns-0.4.2.debian1/taia_pack.c Examining data/tinydyndns-0.4.2.debian1/taia_sub.c Examining data/tinydyndns-0.4.2.debian1/taia_tai.c Examining data/tinydyndns-0.4.2.debian1/taia_uint.c Examining data/tinydyndns-0.4.2.debian1/tdlookup.c Examining data/tinydyndns-0.4.2.debian1/timeoutread.c Examining data/tinydyndns-0.4.2.debian1/timeoutread.h Examining data/tinydyndns-0.4.2.debian1/timeoutwrite.c Examining data/tinydyndns-0.4.2.debian1/timeoutwrite.h Examining data/tinydyndns-0.4.2.debian1/tinydns-conf.c Examining data/tinydyndns-0.4.2.debian1/tinydns-data.c Examining data/tinydyndns-0.4.2.debian1/tinydns-edit.c Examining data/tinydyndns-0.4.2.debian1/tinydns-get.c Examining data/tinydyndns-0.4.2.debian1/tinydns.c Examining data/tinydyndns-0.4.2.debian1/tinydyndns-data.c Examining data/tinydyndns-0.4.2.debian1/tinydyndns-update.c Examining data/tinydyndns-0.4.2.debian1/trycpp.c Examining data/tinydyndns-0.4.2.debian1/trydrent.c Examining data/tinydyndns-0.4.2.debian1/trylsock.c Examining data/tinydyndns-0.4.2.debian1/trypoll.c Examining data/tinydyndns-0.4.2.debian1/tryshsgr.c Examining data/tinydyndns-0.4.2.debian1/trysysel.c Examining data/tinydyndns-0.4.2.debian1/tryulong32.c Examining data/tinydyndns-0.4.2.debian1/tryulong64.c Examining data/tinydyndns-0.4.2.debian1/uint16.h Examining data/tinydyndns-0.4.2.debian1/uint16_pack.c Examining data/tinydyndns-0.4.2.debian1/uint16_unpack.c Examining data/tinydyndns-0.4.2.debian1/uint32_pack.c Examining data/tinydyndns-0.4.2.debian1/uint32_unpack.c Examining data/tinydyndns-0.4.2.debian1/utime.c Examining data/tinydyndns-0.4.2.debian1/walldns-conf.c Examining data/tinydyndns-0.4.2.debian1/walldns.c Examining data/tinydyndns-0.4.2.debian1/x86cpuid.c FINAL RESULTS: data/tinydyndns-0.4.2.debian1/generic-conf.c:24:7: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(dir,03755) == -1) data/tinydyndns-0.4.2.debian1/generic-conf.c:73:7: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(fn,mode) == -1) fail(); data/tinydyndns-0.4.2.debian1/generic-conf.c:78:7: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. if (chown(fn,uid,gid) == -1) fail(); data/tinydyndns-0.4.2.debian1/install.c:25:7: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. if (chown(home,uid,gid) == -1) data/tinydyndns-0.4.2.debian1/install.c:27:7: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(home,mode) == -1) data/tinydyndns-0.4.2.debian1/install.c:43:7: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. if (chown(subdir,uid,gid) == -1) data/tinydyndns-0.4.2.debian1/install.c:45:7: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(subdir,mode) == -1) data/tinydyndns-0.4.2.debian1/install.c:98:7: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. if (chown(file,uid,gid) == -1) data/tinydyndns-0.4.2.debian1/install.c:100:7: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(file,mode) == -1) data/tinydyndns-0.4.2.debian1/install.c:136:7: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. if (chown(file,uid,gid) == -1) data/tinydyndns-0.4.2.debian1/install.c:138:7: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(file,mode) == -1) data/tinydyndns-0.4.2.debian1/dnsfilter.c:72:17: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt = getopt(argc,argv,"c:l:")) != opteof) data/tinydyndns-0.4.2.debian1/droproot.c:17:7: [3] (misc) chroot: chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22). Make sure the program immediately chdir("/"), closes file descriptors, and drops root privileges, and that all necessary files (and no more!) are in the new root. if (chroot(".") == -1) data/tinydyndns-0.4.2.debian1/sgetopt.c:19:9: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. #define getopt sgetoptmine data/tinydyndns-0.4.2.debian1/sgetopt.c:28:5: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. int getopt(int argc,char **argv,const char *opts) data/tinydyndns-0.4.2.debian1/sgetopt.h:5:9: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. #define getopt sgetoptmine data/tinydyndns-0.4.2.debian1/alloc.c:8:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef union { char irrelevant[ALIGNMENT]; double d; } aligned; data/tinydyndns-0.4.2.debian1/auto-str.c:4:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bspace[256]; data/tinydyndns-0.4.2.debian1/auto-str.c:17:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char octal[4]; data/tinydyndns-0.4.2.debian1/axfr-get.c:90:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netreadspace[1024]; data/tinydyndns-0.4.2.debian1/axfr-get.c:92:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netwritespace[1024]; data/tinydyndns-0.4.2.debian1/axfr-get.c:107:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bspace[1024]; data/tinydyndns-0.4.2.debian1/axfr-get.c:135:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[20]; data/tinydyndns-0.4.2.debian1/axfr-get.c:213:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipstr[IP4_FMT]; data/tinydyndns-0.4.2.debian1/axfr-get.c:257:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[20]; data/tinydyndns-0.4.2.debian1/axfrdns.c:67:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netwritespace[1024]; data/tinydyndns-0.4.2.debian1/axfrdns.c:72:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tcpheader[2]; data/tinydyndns-0.4.2.debian1/axfrdns.c:107:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char typeclass[4]; data/tinydyndns-0.4.2.debian1/axfrdns.c:111:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bcdbspace[1024]; data/tinydyndns-0.4.2.debian1/axfrdns.c:126:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/tinydyndns-0.4.2.debian1/axfrdns.c:128:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char clientloc[2]; data/tinydyndns-0.4.2.debian1/axfrdns.c:131:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[32767]; data/tinydyndns-0.4.2.debian1/axfrdns.c:149:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int build(stralloc *sa,char *q,int flagsoa,char id[2]) data/tinydyndns-0.4.2.debian1/axfrdns.c:149:44: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int build(stralloc *sa,char *q,int flagsoa,char id[2]) data/tinydyndns-0.4.2.debian1/axfrdns.c:152:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char misc[20]; data/tinydyndns-0.4.2.debian1/axfrdns.c:153:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[2]; data/tinydyndns-0.4.2.debian1/axfrdns.c:154:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char recordloc[2]; data/tinydyndns-0.4.2.debian1/axfrdns.c:155:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ttl[4]; data/tinydyndns-0.4.2.debian1/axfrdns.c:156:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ttd[8]; data/tinydyndns-0.4.2.debian1/axfrdns.c:223:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void doaxfr(char id[2]) data/tinydyndns-0.4.2.debian1/axfrdns.c:225:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[512]; data/tinydyndns-0.4.2.debian1/axfrdns.c:227:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[4]; data/tinydyndns-0.4.2.debian1/axfrdns.c:311:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tcpheader[2]; data/tinydyndns-0.4.2.debian1/axfrdns.c:312:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/tinydyndns-0.4.2.debian1/axfrdns.c:315:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char seed[128]; data/tinydyndns-0.4.2.debian1/axfrdns.c:320:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[12]; data/tinydyndns-0.4.2.debian1/axfrdns.c:321:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qtype[2]; data/tinydyndns-0.4.2.debian1/axfrdns.c:322:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qclass[2]; data/tinydyndns-0.4.2.debian1/buffer_1.c:3:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer_1_space[BUFFER_OUTSIZE]; data/tinydyndns-0.4.2.debian1/buffer_2.c:3:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer_2_space[256]; data/tinydyndns-0.4.2.debian1/cdb.c:72:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/tinydyndns-0.4.2.debian1/cdb.c:89:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8]; data/tinydyndns-0.4.2.debian1/cdb_make.c:53:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8]; data/tinydyndns-0.4.2.debian1/cdb_make.c:74:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8]; data/tinydyndns-0.4.2.debian1/cdb_make.h:20:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bspace[8192]; data/tinydyndns-0.4.2.debian1/cdb_make.h:21:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char final[2048]; data/tinydyndns-0.4.2.debian1/dd.c:4:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dd(const char *q,const char *base,char ip[4]) data/tinydyndns-0.4.2.debian1/dd.c:4:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dd(const char *q,const char *base,char ip[4]) data/tinydyndns-0.4.2.debian1/dd.c:4:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dd(const char *q,const char *base,char ip[4]) data/tinydyndns-0.4.2.debian1/dns.h:38:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localip[4]; data/tinydyndns-0.4.2.debian1/dns.h:39:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qtype[2]; data/tinydyndns-0.4.2.debian1/dns_dfd.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[63]; data/tinydyndns-0.4.2.debian1/dns_dfd.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[255]; data/tinydyndns-0.4.2.debian1/dns_dtda.c:9:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tinydyndns-0.4.2.debian1/dns_ip.c:9:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[12]; data/tinydyndns-0.4.2.debian1/dns_mx.c:11:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[12]; data/tinydyndns-0.4.2.debian1/dns_mx.c:12:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pref[2]; data/tinydyndns-0.4.2.debian1/dns_name.c:11:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[12]; data/tinydyndns-0.4.2.debian1/dns_name.c:38:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_name4(stralloc *out,const char ip[4]) data/tinydyndns-0.4.2.debian1/dns_name.c:40:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[DNS_NAME4_DOMAIN]; data/tinydyndns-0.4.2.debian1/dns_nd.c:5:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void dns_name4_domain(char name[DNS_NAME4_DOMAIN],const char ip[4]) data/tinydyndns-0.4.2.debian1/dns_nd.c:5:57: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void dns_name4_domain(char name[DNS_NAME4_DOMAIN],const char ip[4]) data/tinydyndns-0.4.2.debian1/dns_packet.c:42:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[255]; data/tinydyndns-0.4.2.debian1/dns_random.c:33:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void dns_random_init(const char data[128]) data/tinydyndns-0.4.2.debian1/dns_random.c:37:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tpack[16]; data/tinydyndns-0.4.2.debian1/dns_rcip.c:10:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int init(char ip[64]) data/tinydyndns-0.4.2.debian1/dns_rcip.c:65:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ip[64]; /* defined if ok */ data/tinydyndns-0.4.2.debian1/dns_rcip.c:67:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_resolvconfip(char s[64]) data/tinydyndns-0.4.2.debian1/dns_rcrw.c:13:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[256]; data/tinydyndns-0.4.2.debian1/dns_resolve.c:8:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_resolve(const char *q,const char qtype[2]) data/tinydyndns-0.4.2.debian1/dns_resolve.c:8:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_resolve(const char *q,const char qtype[2]) data/tinydyndns-0.4.2.debian1/dns_resolve.c:12:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char servers[64]; data/tinydyndns-0.4.2.debian1/dns_sortip.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[4]; data/tinydyndns-0.4.2.debian1/dns_transmit.c:13:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[12]; data/tinydyndns-0.4.2.debian1/dns_transmit.c:22:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[12]; data/tinydyndns-0.4.2.debian1/dns_transmit.c:34:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[12]; data/tinydyndns-0.4.2.debian1/dns_transmit.c:196:53: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_transmit_start(struct dns_transmit *d,const char servers[64],int flagrecursive,const char *q,const char qtype[2],const char localip[4]) data/tinydyndns-0.4.2.debian1/dns_transmit.c:196:94: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_transmit_start(struct dns_transmit *d,const char servers[64],int flagrecursive,const char *q,const char qtype[2],const char localip[4]) data/tinydyndns-0.4.2.debian1/dns_transmit.c:196:108: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_transmit_start(struct dns_transmit *d,const char servers[64],int flagrecursive,const char *q,const char qtype[2],const char localip[4]) data/tinydyndns-0.4.2.debian1/dns_transmit.c:196:128: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_transmit_start(struct dns_transmit *d,const char servers[64],int flagrecursive,const char *q,const char qtype[2],const char localip[4]) data/tinydyndns-0.4.2.debian1/dns_transmit.c:243:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char udpbuf[513]; data/tinydyndns-0.4.2.debian1/dns_txt.c:9:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[12]; data/tinydyndns-0.4.2.debian1/dnscache-conf.c:28:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rootserversbuf[64]; data/tinydyndns-0.4.2.debian1/dnscache-conf.c:57:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tpack[TAIA_PACK]; data/tinydyndns-0.4.2.debian1/dnscache.c:26:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int packetquery(char *buf,unsigned int len,char **q,char qtype[2],char qclass[2],char id[2]) data/tinydyndns-0.4.2.debian1/dnscache.c:26:51: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int packetquery(char *buf,unsigned int len,char **q,char qtype[2],char qclass[2],char id[2]) data/tinydyndns-0.4.2.debian1/dnscache.c:26:60: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int packetquery(char *buf,unsigned int len,char **q,char qtype[2],char qclass[2],char id[2]) data/tinydyndns-0.4.2.debian1/dnscache.c:26:74: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int packetquery(char *buf,unsigned int len,char **q,char qtype[2],char qclass[2],char id[2]) data/tinydyndns-0.4.2.debian1/dnscache.c:26:89: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int packetquery(char *buf,unsigned int len,char **q,char qtype[2],char qclass[2],char id[2]) data/tinydyndns-0.4.2.debian1/dnscache.c:29:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[12]; data/tinydyndns-0.4.2.debian1/dnscache.c:49:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char myipoutgoing[4]; data/tinydyndns-0.4.2.debian1/dnscache.c:50:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char myipincoming[4]; data/tinydyndns-0.4.2.debian1/dnscache.c:51:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[1024]; data/tinydyndns-0.4.2.debian1/dnscache.c:63:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/tinydyndns-0.4.2.debian1/dnscache.c:65:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[2]; data/tinydyndns-0.4.2.debian1/dnscache.c:93:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qtype[2]; data/tinydyndns-0.4.2.debian1/dnscache.c:94:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qclass[2]; data/tinydyndns-0.4.2.debian1/dnscache.c:141:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; /* send response to this address */ data/tinydyndns-0.4.2.debian1/dnscache.c:143:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[2]; data/tinydyndns-0.4.2.debian1/dnscache.c:212:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qtype[2]; data/tinydyndns-0.4.2.debian1/dnscache.c:213:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qclass[2]; data/tinydyndns-0.4.2.debian1/dnscache.c:387:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char seed[128]; data/tinydyndns-0.4.2.debian1/dnsfilter.c:39:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inbuf[1024]; data/tinydyndns-0.4.2.debian1/dnsfilter.c:47:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char servers[64]; data/tinydyndns-0.4.2.debian1/dnsfilter.c:48:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/tinydyndns-0.4.2.debian1/dnsfilter.c:49:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[DNS_NAME4_DOMAIN]; data/tinydyndns-0.4.2.debian1/dnsip.c:9:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char seed[128]; data/tinydyndns-0.4.2.debian1/dnsip.c:13:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[IP4_FMT]; data/tinydyndns-0.4.2.debian1/dnsipq.c:9:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char seed[128]; data/tinydyndns-0.4.2.debian1/dnsipq.c:14:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[IP4_FMT]; data/tinydyndns-0.4.2.debian1/dnsmx.c:17:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char seed[128]; data/tinydyndns-0.4.2.debian1/dnsmx.c:22:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strnum[FMT_ULONG]; data/tinydyndns-0.4.2.debian1/dnsname.c:9:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char seed[128]; data/tinydyndns-0.4.2.debian1/dnsname.c:11:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/tinydyndns-0.4.2.debian1/dnsq.c:27:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int resolve(char *q,char qtype[2],char servers[64]) data/tinydyndns-0.4.2.debian1/dnsq.c:27:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int resolve(char *q,char qtype[2],char servers[64]) data/tinydyndns-0.4.2.debian1/dnsq.c:27:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int resolve(char *q,char qtype[2],char servers[64]) data/tinydyndns-0.4.2.debian1/dnsq.c:50:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char servers[64]; data/tinydyndns-0.4.2.debian1/dnsq.c:54:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[2]; data/tinydyndns-0.4.2.debian1/dnsq.c:59:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char seed[128]; data/tinydyndns-0.4.2.debian1/dnsqr.c:24:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[2]; data/tinydyndns-0.4.2.debian1/dnsqr.c:29:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char seed[128]; data/tinydyndns-0.4.2.debian1/dnstrace.c:33:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipstr[IP4_FMT]; data/tinydyndns-0.4.2.debian1/dnstrace.c:45:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int resolve(char *q,char qtype[2],char ip[4]) data/tinydyndns-0.4.2.debian1/dnstrace.c:45:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int resolve(char *q,char qtype[2],char ip[4]) data/tinydyndns-0.4.2.debian1/dnstrace.c:45:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int resolve(char *q,char qtype[2],char ip[4]) data/tinydyndns-0.4.2.debian1/dnstrace.c:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char servers[64]; data/tinydyndns-0.4.2.debian1/dnstrace.c:85:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/tinydyndns-0.4.2.debian1/dnstrace.c:107:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[2]; data/tinydyndns-0.4.2.debian1/dnstrace.c:118:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[2]; data/tinydyndns-0.4.2.debian1/dnstrace.c:120:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/tinydyndns-0.4.2.debian1/dnstrace.c:129:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void qt_add(const char *q,const char type[2],const char *control,const char ip[4]) data/tinydyndns-0.4.2.debian1/dnstrace.c:129:33: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void qt_add(const char *q,const char type[2],const char *control,const char ip[4]) data/tinydyndns-0.4.2.debian1/dnstrace.c:129:52: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void qt_add(const char *q,const char type[2],const char *control,const char ip[4]) data/tinydyndns-0.4.2.debian1/dnstrace.c:129:72: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void qt_add(const char *q,const char type[2],const char *control,const char ip[4]) data/tinydyndns-0.4.2.debian1/dnstrace.c:151:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void query_add(const char *owner,const char type[2]) data/tinydyndns-0.4.2.debian1/dnstrace.c:151:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void query_add(const char *owner,const char type[2]) data/tinydyndns-0.4.2.debian1/dnstrace.c:206:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void address_add(const char *owner,const char ip[4]) data/tinydyndns-0.4.2.debian1/dnstrace.c:206:42: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void address_add(const char *owner,const char ip[4]) data/tinydyndns-0.4.2.debian1/dnstrace.c:236:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char seed[128]; data/tinydyndns-0.4.2.debian1/dnstrace.c:243:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int typematch(const char rtype[2],const char qtype[2]) data/tinydyndns-0.4.2.debian1/dnstrace.c:243:48: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int typematch(const char rtype[2],const char qtype[2]) data/tinydyndns-0.4.2.debian1/dnstrace.c:248:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void parsepacket(const char *buf,unsigned int len,const char *d,const char dtype[2],const char *control) data/tinydyndns-0.4.2.debian1/dnstrace.c:248:57: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void parsepacket(const char *buf,unsigned int len,const char *d,const char dtype[2],const char *control) data/tinydyndns-0.4.2.debian1/dnstrace.c:248:71: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void parsepacket(const char *buf,unsigned int len,const char *d,const char dtype[2],const char *control) data/tinydyndns-0.4.2.debian1/dnstrace.c:250:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char misc[20]; data/tinydyndns-0.4.2.debian1/dnstrace.c:251:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[12]; data/tinydyndns-0.4.2.debian1/dnstrace.c:396:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[2]; data/tinydyndns-0.4.2.debian1/dnstrace.c:397:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[64]; data/tinydyndns-0.4.2.debian1/dnstxt.c:8:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char seed[128]; data/tinydyndns-0.4.2.debian1/generic-conf.c:14:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[1024]; data/tinydyndns-0.4.2.debian1/install.c:49:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inbuf[BUFFER_INSIZE]; data/tinydyndns-0.4.2.debian1/install.c:50:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outbuf[BUFFER_OUTSIZE]; data/tinydyndns-0.4.2.debian1/ip4_fmt.c:4:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int ip4_fmt(char *s,const char ip[4]) data/tinydyndns-0.4.2.debian1/ip4_fmt.c:4:36: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int ip4_fmt(char *s,const char ip[4]) data/tinydyndns-0.4.2.debian1/ip4_scan.c:4:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int ip4_scan(const char *s,char ip[4]) data/tinydyndns-0.4.2.debian1/ip4_scan.c:4:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int ip4_scan(const char *s,char ip[4]) data/tinydyndns-0.4.2.debian1/log.c:13:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[20]; data/tinydyndns-0.4.2.debian1/log.c:48:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static void ip(const char i[4]) data/tinydyndns-0.4.2.debian1/log.c:56:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static void logid(const char id[2]) data/tinydyndns-0.4.2.debian1/log.c:62:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static void logtype(const char type[2]) data/tinydyndns-0.4.2.debian1/log.c:97:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_query(uint64 *qnum,const char client[4],unsigned int port,const char id[2],const char *q,const char qtype[2]) data/tinydyndns-0.4.2.debian1/log.c:97:74: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_query(uint64 *qnum,const char client[4],unsigned int port,const char id[2],const char *q,const char qtype[2]) data/tinydyndns-0.4.2.debian1/log.c:97:91: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_query(uint64 *qnum,const char client[4],unsigned int port,const char id[2],const char *q,const char qtype[2]) data/tinydyndns-0.4.2.debian1/log.c:97:105: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_query(uint64 *qnum,const char client[4],unsigned int port,const char id[2],const char *q,const char qtype[2]) data/tinydyndns-0.4.2.debian1/log.c:122:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_tcpopen(const char client[4],unsigned int port) data/tinydyndns-0.4.2.debian1/log.c:129:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_tcpclose(const char client[4],unsigned int port) data/tinydyndns-0.4.2.debian1/log.c:138:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_tx(const char *q,const char qtype[2],const char *control,const char servers[64],unsigned int gluelessness) data/tinydyndns-0.4.2.debian1/log.c:138:33: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_tx(const char *q,const char qtype[2],const char *control,const char servers[64],unsigned int gluelessness) data/tinydyndns-0.4.2.debian1/log.c:138:53: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_tx(const char *q,const char qtype[2],const char *control,const char servers[64],unsigned int gluelessness) data/tinydyndns-0.4.2.debian1/log.c:138:73: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_tx(const char *q,const char qtype[2],const char *control,const char servers[64],unsigned int gluelessness) data/tinydyndns-0.4.2.debian1/log.c:153:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_cachedanswer(const char *q,const char type[2]) data/tinydyndns-0.4.2.debian1/log.c:153:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_cachedanswer(const char *q,const char type[2]) data/tinydyndns-0.4.2.debian1/log.c:178:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_nxdomain(const char server[4],const char *q,unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:185:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_nodata(const char server[4],const char *q,const char qtype[2],unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:185:44: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_nodata(const char server[4],const char *q,const char qtype[2],unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:185:58: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_nodata(const char server[4],const char *q,const char qtype[2],unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:192:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_lame(const char server[4],const char *control,const char *referral) data/tinydyndns-0.4.2.debian1/log.c:208:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_rr(const char server[4],const char *q,const char type[2],const char *buf,unsigned int len,unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:208:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_rr(const char server[4],const char *q,const char type[2],const char *buf,unsigned int len,unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:208:54: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_rr(const char server[4],const char *q,const char type[2],const char *buf,unsigned int len,unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:225:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_rrns(const char server[4],const char *q,const char *data,unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:233:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_rrcname(const char server[4],const char *q,const char *data,unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:241:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_rrptr(const char server[4],const char *q,const char *data,unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:249:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_rrmx(const char server[4],const char *q,const char *mx,const char pref[2],unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:249:42: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_rrmx(const char server[4],const char *q,const char *mx,const char pref[2],unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:249:56: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_rrmx(const char server[4],const char *q,const char *mx,const char pref[2],unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:249:71: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_rrmx(const char server[4],const char *q,const char *mx,const char pref[2],unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:260:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_rrsoa(const char server[4],const char *q,const char *n1,const char *n2,const char misc[20],unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:260:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_rrsoa(const char server[4],const char *q,const char *n1,const char *n2,const char misc[20],unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:260:57: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_rrsoa(const char server[4],const char *q,const char *n1,const char *n2,const char misc[20],unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:260:72: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_rrsoa(const char server[4],const char *q,const char *n1,const char *n2,const char misc[20],unsigned int ttl) data/tinydyndns-0.4.2.debian1/log.c:260:87: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void log_rrsoa(const char server[4],const char *q,const char *n1,const char *n2,const char misc[20],unsigned int ttl) data/tinydyndns-0.4.2.debian1/okclient.c:7:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char fn[3 + IP4_FMT]; data/tinydyndns-0.4.2.debian1/okclient.c:9:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int okclient(char ip[4]) data/tinydyndns-0.4.2.debian1/open_read.c:6:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). { return open(fn,O_RDONLY | O_NDELAY); } data/tinydyndns-0.4.2.debian1/open_trunc.c:6:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). { return open(fn,O_WRONLY | O_NDELAY | O_TRUNC | O_CREAT,0644); } data/tinydyndns-0.4.2.debian1/parsetype.c:8:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int parsetype(char *s,char type[2]) data/tinydyndns-0.4.2.debian1/parsetype.c:8:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int parsetype(char *s,char type[2]) data/tinydyndns-0.4.2.debian1/pickdns-data.c:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/tinydyndns-0.4.2.debian1/pickdns-data.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char location[2]; data/tinydyndns-0.4.2.debian1/pickdns-data.c:103:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bspace[1024]; data/tinydyndns-0.4.2.debian1/pickdns-data.c:117:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strnum[FMT_ULONG]; data/tinydyndns-0.4.2.debian1/pickdns.c:12:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char seed[128]; data/tinydyndns-0.4.2.debian1/pickdns.c:20:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char key[258]; data/tinydyndns-0.4.2.debian1/pickdns.c:21:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char data[512]; data/tinydyndns-0.4.2.debian1/pickdns.c:23:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int doit(char *q,char qtype[2],char ip[4]) data/tinydyndns-0.4.2.debian1/pickdns.c:23:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int doit(char *q,char qtype[2],char ip[4]) data/tinydyndns-0.4.2.debian1/pickdns.c:23:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int doit(char *q,char qtype[2],char ip[4]) data/tinydyndns-0.4.2.debian1/pickdns.c:89:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int respond(char *q,char qtype[2],char ip[4]) data/tinydyndns-0.4.2.debian1/pickdns.c:89:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int respond(char *q,char qtype[2],char ip[4]) data/tinydyndns-0.4.2.debian1/pickdns.c:89:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int respond(char *q,char qtype[2],char ip[4]) data/tinydyndns-0.4.2.debian1/printpacket.c:21:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[12]; data/tinydyndns-0.4.2.debian1/printrecord.c:10:50: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int printrecord_cat(stralloc *out,const char *buf,unsigned int len,unsigned int pos,const char *q,const char qtype[2]) data/tinydyndns-0.4.2.debian1/printrecord.c:10:100: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int printrecord_cat(stralloc *out,const char *buf,unsigned int len,unsigned int pos,const char *q,const char qtype[2]) data/tinydyndns-0.4.2.debian1/printrecord.c:10:114: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int printrecord_cat(stralloc *out,const char *buf,unsigned int len,unsigned int pos,const char *q,const char qtype[2]) data/tinydyndns-0.4.2.debian1/printrecord.c:13:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char misc[20]; data/tinydyndns-0.4.2.debian1/printrecord.c:111:46: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int printrecord(stralloc *out,const char *buf,unsigned int len,unsigned int pos,const char *q,const char qtype[2]) data/tinydyndns-0.4.2.debian1/printrecord.c:111:96: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int printrecord(stralloc *out,const char *buf,unsigned int len,unsigned int pos,const char *q,const char qtype[2]) data/tinydyndns-0.4.2.debian1/printrecord.c:111:110: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int printrecord(stralloc *out,const char *buf,unsigned int len,unsigned int pos,const char *q,const char qtype[2]) data/tinydyndns-0.4.2.debian1/qlog.c:23:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void qlog(const char ip[4],uint16 port,const char id[2],const char *q,const char qtype[2],const char *result) data/tinydyndns-0.4.2.debian1/qlog.c:23:46: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void qlog(const char ip[4],uint16 port,const char id[2],const char *q,const char qtype[2],const char *result) data/tinydyndns-0.4.2.debian1/qlog.c:23:63: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void qlog(const char ip[4],uint16 port,const char id[2],const char *q,const char qtype[2],const char *result) data/tinydyndns-0.4.2.debian1/qlog.c:23:77: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void qlog(const char ip[4],uint16 port,const char id[2],const char *q,const char qtype[2],const char *result) data/tinydyndns-0.4.2.debian1/query.c:23:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static void cachegeneric(const char type[2],const char *d,const char *data,unsigned int datalen,uint32 ttl) data/tinydyndns-0.4.2.debian1/query.c:26:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[257]; data/tinydyndns-0.4.2.debian1/query.c:38:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char save_buf[8192]; data/tinydyndns-0.4.2.debian1/query.c:56:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static void save_finish(const char type[2],const char *d,uint32 ttl) data/tinydyndns-0.4.2.debian1/query.c:63:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int typematch(const char rtype[2],const char qtype[2]) data/tinydyndns-0.4.2.debian1/query.c:63:48: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int typematch(const char rtype[2],const char qtype[2]) data/tinydyndns-0.4.2.debian1/query.c:68:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static uint32 ttlget(char buf[4]) data/tinydyndns-0.4.2.debian1/query.c:113:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int globalip(char *d,char ip[4]) data/tinydyndns-0.4.2.debian1/query.c:113:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int globalip(char *d,char ip[4]) data/tinydyndns-0.4.2.debian1/query.c:132:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header1[12]; data/tinydyndns-0.4.2.debian1/query.c:133:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header2[12]; data/tinydyndns-0.4.2.debian1/query.c:162:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[257]; data/tinydyndns-0.4.2.debian1/query.c:168:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[12]; data/tinydyndns-0.4.2.debian1/query.c:169:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char misc[20]; data/tinydyndns-0.4.2.debian1/query.c:563:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[2]; data/tinydyndns-0.4.2.debian1/query.c:821:33: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int query_start(struct query *z,char *dn,char type[2],char class[2],char localip[4]) data/tinydyndns-0.4.2.debian1/query.c:821:42: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int query_start(struct query *z,char *dn,char type[2],char class[2],char localip[4]) data/tinydyndns-0.4.2.debian1/query.c:821:55: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int query_start(struct query *z,char *dn,char type[2],char class[2],char localip[4]) data/tinydyndns-0.4.2.debian1/query.c:821:69: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int query_start(struct query *z,char *dn,char type[2],char class[2],char localip[4]) data/tinydyndns-0.4.2.debian1/query.h:14:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *name[QUERY_MAXLEVEL]; data/tinydyndns-0.4.2.debian1/query.h:15:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *control[QUERY_MAXLEVEL]; /* pointing inside name */ data/tinydyndns-0.4.2.debian1/query.h:16:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ns[QUERY_MAXLEVEL][QUERY_MAXNS]; data/tinydyndns-0.4.2.debian1/query.h:17:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char servers[QUERY_MAXLEVEL][64]; data/tinydyndns-0.4.2.debian1/query.h:18:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *alias[QUERY_MAXALIAS]; data/tinydyndns-0.4.2.debian1/query.h:20:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localip[4]; data/tinydyndns-0.4.2.debian1/query.h:21:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[2]; data/tinydyndns-0.4.2.debian1/query.h:22:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char class[2]; data/tinydyndns-0.4.2.debian1/random-ip.c:7:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/tinydyndns-0.4.2.debian1/random-ip.c:10:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tab[256]; data/tinydyndns-0.4.2.debian1/random-ip.c:12:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strnum[FMT_ULONG]; data/tinydyndns-0.4.2.debian1/random-ip.c:14:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char seed[128]; data/tinydyndns-0.4.2.debian1/rbldns-data.c:26:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bspace[1024]; data/tinydyndns-0.4.2.debian1/rbldns-data.c:36:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strnum[FMT_ULONG]; data/tinydyndns-0.4.2.debian1/rbldns-data.c:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/tinydyndns-0.4.2.debian1/rbldns.c:16:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char key[5]; data/tinydyndns-0.4.2.debian1/rbldns.c:17:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char data[100 + IP4_FMT]; data/tinydyndns-0.4.2.debian1/rbldns.c:19:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int doit(char *q,char qtype[2]) data/tinydyndns-0.4.2.debian1/rbldns.c:19:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int doit(char *q,char qtype[2]) data/tinydyndns-0.4.2.debian1/rbldns.c:24:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reverseip[4]; data/tinydyndns-0.4.2.debian1/rbldns.c:25:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/tinydyndns-0.4.2.debian1/rbldns.c:90:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int respond(char *q,char qtype[2],char ip[4]) data/tinydyndns-0.4.2.debian1/rbldns.c:90:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int respond(char *q,char qtype[2],char ip[4]) data/tinydyndns-0.4.2.debian1/rbldns.c:90:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int respond(char *q,char qtype[2],char ip[4]) data/tinydyndns-0.4.2.debian1/response.c:6:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char response[65535]; data/tinydyndns-0.4.2.debian1/response.c:11:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name[NAMES][128]; data/tinydyndns-0.4.2.debian1/response.c:27:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2]; data/tinydyndns-0.4.2.debian1/response.c:52:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int response_query(const char *q,const char qtype[2],const char qclass[2]) data/tinydyndns-0.4.2.debian1/response.c:52:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int response_query(const char *q,const char qtype[2],const char qclass[2]) data/tinydyndns-0.4.2.debian1/response.c:52:60: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int response_query(const char *q,const char qtype[2],const char qclass[2]) data/tinydyndns-0.4.2.debian1/response.c:73:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int response_rstart(const char *d,const char type[2],uint32 ttl) data/tinydyndns-0.4.2.debian1/response.c:73:41: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int response_rstart(const char *d,const char type[2],uint32 ttl) data/tinydyndns-0.4.2.debian1/response.c:75:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ttlstr[4]; data/tinydyndns-0.4.2.debian1/response.c:112:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void response_id(const char id[2]) data/tinydyndns-0.4.2.debian1/roots.c:43:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int roots(char servers[64],char *q) data/tinydyndns-0.4.2.debian1/roots.c:63:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char servers[64]; data/tinydyndns-0.4.2.debian1/server.c:20:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ip[4]; data/tinydyndns-0.4.2.debian1/server.c:23:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[513]; data/tinydyndns-0.4.2.debian1/server.c:31:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[12]; data/tinydyndns-0.4.2.debian1/server.c:32:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qtype[2]; data/tinydyndns-0.4.2.debian1/server.c:33:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qclass[2]; data/tinydyndns-0.4.2.debian1/sgetopt.c:41:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chp[2]; chp[0] = optproblem; chp[1] = '\n'; data/tinydyndns-0.4.2.debian1/socket_accept.c:8:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_accept4(int s,char ip[4],uint16 *port) data/tinydyndns-0.4.2.debian1/socket_bind.c:8:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_bind4(int s,char ip[4],uint16 port) data/tinydyndns-0.4.2.debian1/socket_bind.c:20:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_bind4_reuse(int s,char ip[4],uint16 port) data/tinydyndns-0.4.2.debian1/socket_conn.c:9:33: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_connect4(int s,const char ip[4],uint16 port) data/tinydyndns-0.4.2.debian1/socket_recv.c:8:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_recv4(int s,char *buf,int len,char ip[4],uint16 *port) data/tinydyndns-0.4.2.debian1/socket_recv.c:8:42: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_recv4(int s,char *buf,int len,char ip[4],uint16 *port) data/tinydyndns-0.4.2.debian1/socket_send.c:8:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_send4(int s,const char *buf,int len,const char ip[4],uint16 port) data/tinydyndns-0.4.2.debian1/socket_send.c:8:54: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_send4(int s,const char *buf,int len,const char ip[4],uint16 port) data/tinydyndns-0.4.2.debian1/tdlookup.c:12:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int want(const char *owner,const char type[2]) data/tinydyndns-0.4.2.debian1/tdlookup.c:12:41: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int want(const char *owner,const char type[2]) data/tinydyndns-0.4.2.debian1/tdlookup.c:16:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char x[10]; data/tinydyndns-0.4.2.debian1/tdlookup.c:36:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char clientloc[2]; data/tinydyndns-0.4.2.debian1/tdlookup.c:40:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char data[32767]; data/tinydyndns-0.4.2.debian1/tdlookup.c:43:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char type[2]; data/tinydyndns-0.4.2.debian1/tdlookup.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ttd[8]; data/tinydyndns-0.4.2.debian1/tdlookup.c:52:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ttlstr[4]; data/tinydyndns-0.4.2.debian1/tdlookup.c:53:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char recordloc[2]; data/tinydyndns-0.4.2.debian1/tdlookup.c:92:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[20]; data/tinydyndns-0.4.2.debian1/tdlookup.c:106:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int doit(char *q,char qtype[2]) data/tinydyndns-0.4.2.debian1/tdlookup.c:106:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int doit(char *q,char qtype[2]) data/tinydyndns-0.4.2.debian1/tdlookup.c:119:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char x[20]; data/tinydyndns-0.4.2.debian1/tdlookup.c:121:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[8][4]; data/tinydyndns-0.4.2.debian1/tdlookup.c:281:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int respond(char *q,char qtype[2],char ip[4]) data/tinydyndns-0.4.2.debian1/tdlookup.c:281:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int respond(char *q,char qtype[2],char ip[4]) data/tinydyndns-0.4.2.debian1/tdlookup.c:281:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int respond(char *q,char qtype[2],char ip[4]) data/tinydyndns-0.4.2.debian1/tdlookup.c:285:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[6]; data/tinydyndns-0.4.2.debian1/tinydns-data.c:37:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void ttdparse(stralloc *sa,char ttd[8]) data/tinydyndns-0.4.2.debian1/tinydns-data.c:56:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void locparse(stralloc *sa,char loc[2]) data/tinydyndns-0.4.2.debian1/tinydns-data.c:110:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char defaultsoa[20]; data/tinydyndns-0.4.2.debian1/tinydns-data.c:136:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void rr_start(const char type[2],unsigned long ttl,const char ttd[8],const char loc[2]) data/tinydyndns-0.4.2.debian1/tinydns-data.c:136:58: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void rr_start(const char type[2],unsigned long ttl,const char ttd[8],const char loc[2]) data/tinydyndns-0.4.2.debian1/tinydns-data.c:136:76: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void rr_start(const char type[2],unsigned long ttl,const char ttd[8],const char loc[2]) data/tinydyndns-0.4.2.debian1/tinydns-data.c:138:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tinydyndns-0.4.2.debian1/tinydns-data.c:163:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bspace[1024]; data/tinydyndns-0.4.2.debian1/tinydns-data.c:174:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dptr[DNS_NAME4_DOMAIN]; data/tinydyndns-0.4.2.debian1/tinydns-data.c:176:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strnum[FMT_ULONG]; data/tinydyndns-0.4.2.debian1/tinydns-data.c:192:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ttd[8]; data/tinydyndns-0.4.2.debian1/tinydns-data.c:193:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char loc[2]; data/tinydyndns-0.4.2.debian1/tinydns-data.c:195:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/tinydyndns-0.4.2.debian1/tinydns-data.c:196:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[2]; data/tinydyndns-0.4.2.debian1/tinydns-data.c:197:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char soa[20]; data/tinydyndns-0.4.2.debian1/tinydns-data.c:198:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/tinydyndns-0.4.2.debian1/tinydns-edit.c:45:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char targetip[4]; data/tinydyndns-0.4.2.debian1/tinydns-edit.c:49:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bspace[1024]; data/tinydyndns-0.4.2.debian1/tinydns-edit.c:53:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bnewspace[1024]; data/tinydyndns-0.4.2.debian1/tinydns-edit.c:63:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/tinydyndns-0.4.2.debian1/tinydns-edit.c:64:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipstr[IP4_FMT]; data/tinydyndns-0.4.2.debian1/tinydns-edit.c:65:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strnum[FMT_ULONG]; data/tinydyndns-0.4.2.debian1/tinydns-edit.c:67:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *names[26]; data/tinydyndns-0.4.2.debian1/tinydns-get.c:29:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ip[4]; data/tinydyndns-0.4.2.debian1/tinydns-get.c:30:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char type[2]; data/tinydyndns-0.4.2.debian1/tinydns.c:6:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char seed[128]; data/tinydyndns-0.4.2.debian1/tinydyndns-data.c:74:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bcdbspace[4096]; data/tinydyndns-0.4.2.debian1/tinydyndns-data.c:75:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8]; data/tinydyndns-0.4.2.debian1/tinydyndns-data.c:76:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipbuf[4]; data/tinydyndns-0.4.2.debian1/tinydyndns-update.c:35:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/tinydyndns-0.4.2.debian1/tinydyndns-update.c:36:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[21]; data/tinydyndns-0.4.2.debian1/tinydyndns-update.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bcdbspace[4096]; data/tinydyndns-0.4.2.debian1/tinydyndns-update.c:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char btmpspace[4096]; data/tinydyndns-0.4.2.debian1/trypoll.c:9:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). x.fd = open("trypoll.c",O_RDONLY); data/tinydyndns-0.4.2.debian1/uint16_pack.c:3:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint16_pack(char s[2],uint16 u) data/tinydyndns-0.4.2.debian1/uint16_pack.c:9:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint16_pack_big(char s[2],uint16 u) data/tinydyndns-0.4.2.debian1/uint16_unpack.c:3:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint16_unpack(const char s[2],uint16 *u) data/tinydyndns-0.4.2.debian1/uint16_unpack.c:14:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint16_unpack_big(const char s[2],uint16 *u) data/tinydyndns-0.4.2.debian1/uint32_pack.c:3:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint32_pack(char s[4],uint32 u) data/tinydyndns-0.4.2.debian1/uint32_pack.c:13:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint32_pack_big(char s[4],uint32 u) data/tinydyndns-0.4.2.debian1/uint32_unpack.c:3:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint32_unpack(const char s[4],uint32 *u) data/tinydyndns-0.4.2.debian1/uint32_unpack.c:18:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint32_unpack_big(const char s[4],uint32 *u) data/tinydyndns-0.4.2.debian1/walldns.c:14:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int respond(char *q,char qtype[2]) data/tinydyndns-0.4.2.debian1/walldns.c:14:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int respond(char *q,char qtype[2]) data/tinydyndns-0.4.2.debian1/walldns.c:18:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/tinydyndns-0.4.2.debian1/buffer_read.c:6:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return read(fd,buf,len); data/tinydyndns-0.4.2.debian1/cdb.c:55:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(c->fd,buf,len); data/tinydyndns-0.4.2.debian1/dns_transmit.c:320:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(fd,&ch,1); data/tinydyndns-0.4.2.debian1/dns_transmit.c:333:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(fd,&ch,1); data/tinydyndns-0.4.2.debian1/dns_transmit.c:351:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(fd,d->packet + d->pos,d->packetlen - d->pos); data/tinydyndns-0.4.2.debian1/dnscache-conf.c:160:3: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(000); data/tinydyndns-0.4.2.debian1/dnscache-conf.c:165:3: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(022); data/tinydyndns-0.4.2.debian1/dnscache.c:228:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(x->tcp,&ch,1); data/tinydyndns-0.4.2.debian1/dnscache.c:417:3: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(0,seed,sizeof seed); data/tinydyndns-0.4.2.debian1/dnsfilter.c:125:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(0,inbuf + inbuflen,(sizeof inbuf) - inbuflen); data/tinydyndns-0.4.2.debian1/generic-conf.c:21:3: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(022); data/tinydyndns-0.4.2.debian1/install.c:148:3: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(077); data/tinydyndns-0.4.2.debian1/pickdns-data.c:137:3: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(022); data/tinydyndns-0.4.2.debian1/rbldns-data.c:56:3: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(022); data/tinydyndns-0.4.2.debian1/readclose.c:10:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(fd,sa->s + sa->len,bufsize); data/tinydyndns-0.4.2.debian1/socket_conn.c:29:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(s,&ch,1); /* sets errno */ data/tinydyndns-0.4.2.debian1/timeoutread.c:27:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return read(fd,buf,len); data/tinydyndns-0.4.2.debian1/tinydns-data.c:200:3: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(022); data/tinydyndns-0.4.2.debian1/tinydns-edit.c:109:3: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(077); ANALYSIS SUMMARY: Hits = 385 Lines analyzed = 12102 in approximately 0.37 seconds (32520 lines/second) Physical Source Lines of Code (SLOC) = 10245 Hits@level = [0] 5 [1] 19 [2] 350 [3] 5 [4] 0 [5] 11 Hits@level+ = [0+] 390 [1+] 385 [2+] 366 [3+] 16 [4+] 11 [5+] 11 Hits/KSLOC@level+ = [0+] 38.0673 [1+] 37.5793 [2+] 35.7247 [3+] 1.56174 [4+] 1.07369 [5+] 1.07369 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.