Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/util-linux-2.36.1/libblkid/samples/mkfs.c Examining data/util-linux-2.36.1/libblkid/samples/topology.c Examining data/util-linux-2.36.1/libblkid/samples/partitions.c Examining data/util-linux-2.36.1/libblkid/samples/superblocks.c Examining data/util-linux-2.36.1/libblkid/src/cache.c Examining data/util-linux-2.36.1/libblkid/src/config.c Examining data/util-linux-2.36.1/libblkid/src/devname.c Examining data/util-linux-2.36.1/libblkid/src/resolve.c Examining data/util-linux-2.36.1/libblkid/src/read.c Examining data/util-linux-2.36.1/libblkid/src/dev.c Examining data/util-linux-2.36.1/libblkid/src/topology/md.c Examining data/util-linux-2.36.1/libblkid/src/topology/topology.h Examining data/util-linux-2.36.1/libblkid/src/topology/sysfs.c Examining data/util-linux-2.36.1/libblkid/src/topology/ioctl.c Examining data/util-linux-2.36.1/libblkid/src/topology/topology.c Examining data/util-linux-2.36.1/libblkid/src/topology/evms.c Examining data/util-linux-2.36.1/libblkid/src/topology/dm.c Examining data/util-linux-2.36.1/libblkid/src/topology/lvm.c Examining data/util-linux-2.36.1/libblkid/src/tag.c Examining data/util-linux-2.36.1/libblkid/src/save.c Examining data/util-linux-2.36.1/libblkid/src/version.c Examining data/util-linux-2.36.1/libblkid/src/verify.c Examining data/util-linux-2.36.1/libblkid/src/encode.c Examining data/util-linux-2.36.1/libblkid/src/init.c Examining data/util-linux-2.36.1/libblkid/src/probe.c Examining data/util-linux-2.36.1/libblkid/src/partitions/partitions.h Examining data/util-linux-2.36.1/libblkid/src/partitions/gpt.c Examining data/util-linux-2.36.1/libblkid/src/partitions/aix.c Examining data/util-linux-2.36.1/libblkid/src/partitions/dos.c Examining data/util-linux-2.36.1/libblkid/src/partitions/minix.c Examining data/util-linux-2.36.1/libblkid/src/partitions/sgi.c Examining data/util-linux-2.36.1/libblkid/src/partitions/atari.c Examining data/util-linux-2.36.1/libblkid/src/partitions/bsd.c Examining data/util-linux-2.36.1/libblkid/src/partitions/mac.c Examining data/util-linux-2.36.1/libblkid/src/partitions/ultrix.c Examining data/util-linux-2.36.1/libblkid/src/partitions/unixware.c Examining data/util-linux-2.36.1/libblkid/src/partitions/solaris_x86.c Examining data/util-linux-2.36.1/libblkid/src/partitions/partitions.c Examining data/util-linux-2.36.1/libblkid/src/partitions/aix.h Examining data/util-linux-2.36.1/libblkid/src/partitions/sun.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/hfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/zfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/jfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/vmfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/f2fs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/sysv.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/hpfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/bluestore.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/vdo.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/ext.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/nilfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/nvidia_raid.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/via_raid.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/exfat.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/silicon_raid.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/ubi.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/highpoint_raid.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/ubifs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/minix.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/cramfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/btrfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/lsi_raid.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/adaptec_raid.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/refs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/reiserfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/zonefs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/mpool.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/linux_raid.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/netware.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/drbd.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/drbdmanage.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/ufs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/bfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/romfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/vxfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/jmicron_raid.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/superblocks.h Examining data/util-linux-2.36.1/libblkid/src/superblocks/ddf_raid.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/exfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/squashfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/gfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/xfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/promise_raid.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/ntfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/befs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/isw_raid.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/lvm.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/apfs.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/bcache.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/luks.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/udf.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/drbdproxy_datalog.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/stratis.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/superblocks.c Examining data/util-linux-2.36.1/libblkid/src/superblocks/swap.c Examining data/util-linux-2.36.1/libblkid/src/blkidP.h Examining data/util-linux-2.36.1/libblkid/src/evaluate.c Examining data/util-linux-2.36.1/libblkid/src/devno.c Examining data/util-linux-2.36.1/libblkid/src/getsize.c Examining data/util-linux-2.36.1/misc-utils/namei.c Examining data/util-linux-2.36.1/misc-utils/cal.c Examining data/util-linux-2.36.1/misc-utils/hardlink.c Examining data/util-linux-2.36.1/misc-utils/fincore.c Examining data/util-linux-2.36.1/misc-utils/findfs.c Examining data/util-linux-2.36.1/misc-utils/look.c Examining data/util-linux-2.36.1/misc-utils/lsblk.h Examining data/util-linux-2.36.1/misc-utils/uuidparse.c Examining data/util-linux-2.36.1/misc-utils/uuidd.c Examining data/util-linux-2.36.1/misc-utils/findmnt.h Examining data/util-linux-2.36.1/misc-utils/getopt.c Examining data/util-linux-2.36.1/misc-utils/lsblk-properties.c Examining data/util-linux-2.36.1/misc-utils/lsblk-devtree.c Examining data/util-linux-2.36.1/misc-utils/kill.c Examining data/util-linux-2.36.1/misc-utils/logger.c Examining data/util-linux-2.36.1/misc-utils/test_uuidd.c Examining data/util-linux-2.36.1/misc-utils/findmnt.c Examining data/util-linux-2.36.1/misc-utils/findmnt-verify.c Examining data/util-linux-2.36.1/misc-utils/blkid.c Examining data/util-linux-2.36.1/misc-utils/wipefs.c Examining data/util-linux-2.36.1/misc-utils/rename.c Examining data/util-linux-2.36.1/misc-utils/whereis.c Examining data/util-linux-2.36.1/misc-utils/lslocks.c Examining data/util-linux-2.36.1/misc-utils/lsblk-mnt.c Examining data/util-linux-2.36.1/misc-utils/mcookie.c Examining data/util-linux-2.36.1/misc-utils/lsblk.c Examining data/util-linux-2.36.1/misc-utils/uuidgen.c Examining data/util-linux-2.36.1/sys-utils/dmesg.c Examining data/util-linux-2.36.1/sys-utils/eject.c Examining data/util-linux-2.36.1/sys-utils/setarch.c Examining data/util-linux-2.36.1/sys-utils/lscpu.c Examining data/util-linux-2.36.1/sys-utils/lsipc.c Examining data/util-linux-2.36.1/sys-utils/mount.c Examining data/util-linux-2.36.1/sys-utils/wdctl.c Examining data/util-linux-2.36.1/sys-utils/fstrim.c Examining data/util-linux-2.36.1/sys-utils/hwclock-rtc.c Examining data/util-linux-2.36.1/sys-utils/lscpu-dmi.c Examining data/util-linux-2.36.1/sys-utils/rfkill.c Examining data/util-linux-2.36.1/sys-utils/flock.c Examining data/util-linux-2.36.1/sys-utils/swapoff.c Examining data/util-linux-2.36.1/sys-utils/ctrlaltdel.c Examining data/util-linux-2.36.1/sys-utils/rtcwake.c Examining data/util-linux-2.36.1/sys-utils/readprofile.c Examining data/util-linux-2.36.1/sys-utils/pivot_root.c Examining data/util-linux-2.36.1/sys-utils/blkzone.c Examining data/util-linux-2.36.1/sys-utils/lsns.c Examining data/util-linux-2.36.1/sys-utils/prlimit.c Examining data/util-linux-2.36.1/sys-utils/ipcutils.c Examining data/util-linux-2.36.1/sys-utils/choom.c Examining data/util-linux-2.36.1/sys-utils/chmem.c Examining data/util-linux-2.36.1/sys-utils/ldattach.c Examining data/util-linux-2.36.1/sys-utils/zramctl.c Examining data/util-linux-2.36.1/sys-utils/ipcutils.h Examining data/util-linux-2.36.1/sys-utils/hwclock-cmos.c Examining data/util-linux-2.36.1/sys-utils/umount.c Examining data/util-linux-2.36.1/sys-utils/swapon.c Examining data/util-linux-2.36.1/sys-utils/nsenter.c Examining data/util-linux-2.36.1/sys-utils/chcpu.c Examining data/util-linux-2.36.1/sys-utils/lscpu.h Examining data/util-linux-2.36.1/sys-utils/mountpoint.c Examining data/util-linux-2.36.1/sys-utils/ipcrm.c Examining data/util-linux-2.36.1/sys-utils/blkdiscard.c Examining data/util-linux-2.36.1/sys-utils/lsirq.c Examining data/util-linux-2.36.1/sys-utils/irq-common.c Examining data/util-linux-2.36.1/sys-utils/irq-common.h Examining data/util-linux-2.36.1/sys-utils/swapon-common.h Examining data/util-linux-2.36.1/sys-utils/ipcmk.c Examining data/util-linux-2.36.1/sys-utils/swapon-common.c Examining data/util-linux-2.36.1/sys-utils/fallocate.c Examining data/util-linux-2.36.1/sys-utils/lscpu-arm.c Examining data/util-linux-2.36.1/sys-utils/switch_root.c Examining data/util-linux-2.36.1/sys-utils/renice.c Examining data/util-linux-2.36.1/sys-utils/hwclock.h Examining data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c Examining data/util-linux-2.36.1/sys-utils/lsmem.c Examining data/util-linux-2.36.1/sys-utils/setpriv.c Examining data/util-linux-2.36.1/sys-utils/ipcs.c Examining data/util-linux-2.36.1/sys-utils/setsid.c Examining data/util-linux-2.36.1/sys-utils/tunelp.c Examining data/util-linux-2.36.1/sys-utils/irqtop.c Examining data/util-linux-2.36.1/sys-utils/unshare.c Examining data/util-linux-2.36.1/sys-utils/losetup.c Examining data/util-linux-2.36.1/sys-utils/fsfreeze.c Examining data/util-linux-2.36.1/sys-utils/hwclock.c Examining data/util-linux-2.36.1/lib/monotonic.c Examining data/util-linux-2.36.1/lib/pty-session.c Examining data/util-linux-2.36.1/lib/loopdev.c Examining data/util-linux-2.36.1/lib/canonicalize.c Examining data/util-linux-2.36.1/lib/mbsedit.c Examining data/util-linux-2.36.1/lib/caputils.c Examining data/util-linux-2.36.1/lib/crc32.c Examining data/util-linux-2.36.1/lib/ismounted.c Examining data/util-linux-2.36.1/lib/randutils.c Examining data/util-linux-2.36.1/lib/pwdutils.c Examining data/util-linux-2.36.1/lib/timer.c Examining data/util-linux-2.36.1/lib/fileutils.c Examining data/util-linux-2.36.1/lib/mangle.c Examining data/util-linux-2.36.1/lib/color-names.c Examining data/util-linux-2.36.1/lib/match.c Examining data/util-linux-2.36.1/lib/procutils.c Examining data/util-linux-2.36.1/lib/strutils.c Examining data/util-linux-2.36.1/lib/env.c Examining data/util-linux-2.36.1/lib/timeutils.c Examining data/util-linux-2.36.1/lib/exec_shell.c Examining data/util-linux-2.36.1/lib/crc32c.c Examining data/util-linux-2.36.1/lib/path.c Examining data/util-linux-2.36.1/lib/signames.c Examining data/util-linux-2.36.1/lib/sysfs.c Examining data/util-linux-2.36.1/lib/colors.c Examining data/util-linux-2.36.1/lib/mbsalign.c Examining data/util-linux-2.36.1/lib/linux_version.c Examining data/util-linux-2.36.1/lib/encode.c Examining data/util-linux-2.36.1/lib/strv.c Examining data/util-linux-2.36.1/lib/ttyutils.c Examining data/util-linux-2.36.1/lib/blkdev.c Examining data/util-linux-2.36.1/lib/idcache.c Examining data/util-linux-2.36.1/lib/langinfo.c Examining data/util-linux-2.36.1/lib/swapprober.c Examining data/util-linux-2.36.1/lib/plymouth-ctrl.c Examining data/util-linux-2.36.1/lib/setproctitle.c Examining data/util-linux-2.36.1/lib/sha1.c Examining data/util-linux-2.36.1/lib/pager.c Examining data/util-linux-2.36.1/lib/md5.c Examining data/util-linux-2.36.1/lib/cpuset.c Examining data/util-linux-2.36.1/text-utils/ul.c Examining data/util-linux-2.36.1/text-utils/hexdump-parse.c Examining data/util-linux-2.36.1/text-utils/rev.c Examining data/util-linux-2.36.1/text-utils/pg.c Examining data/util-linux-2.36.1/text-utils/hexdump.h Examining data/util-linux-2.36.1/text-utils/col.c Examining data/util-linux-2.36.1/text-utils/hexdump.c Examining data/util-linux-2.36.1/text-utils/colcrt.c Examining data/util-linux-2.36.1/text-utils/hexdump-display.c Examining data/util-linux-2.36.1/text-utils/colrm.c Examining data/util-linux-2.36.1/text-utils/more.c Examining data/util-linux-2.36.1/text-utils/hexdump-conv.c Examining data/util-linux-2.36.1/text-utils/line.c Examining data/util-linux-2.36.1/text-utils/column.c Examining data/util-linux-2.36.1/libuuid/src/gen_uuid.c Examining data/util-linux-2.36.1/libuuid/src/clear.c Examining data/util-linux-2.36.1/libuuid/src/unparse.c Examining data/util-linux-2.36.1/libuuid/src/unpack.c Examining data/util-linux-2.36.1/libuuid/src/test_uuid.c Examining data/util-linux-2.36.1/libuuid/src/parse.c Examining data/util-linux-2.36.1/libuuid/src/uuidP.h Examining data/util-linux-2.36.1/libuuid/src/uuid.h Examining data/util-linux-2.36.1/libuuid/src/uuid_time.c Examining data/util-linux-2.36.1/libuuid/src/predefined.c Examining data/util-linux-2.36.1/libuuid/src/uuidd.h Examining data/util-linux-2.36.1/libuuid/src/compare.c Examining data/util-linux-2.36.1/libuuid/src/copy.c Examining data/util-linux-2.36.1/libuuid/src/isnull.c Examining data/util-linux-2.36.1/libuuid/src/pack.c Examining data/util-linux-2.36.1/libsmartcols/samples/grouping-overlay.c Examining data/util-linux-2.36.1/libsmartcols/samples/continuous.c Examining data/util-linux-2.36.1/libsmartcols/samples/tree.c Examining data/util-linux-2.36.1/libsmartcols/samples/fromfile.c Examining data/util-linux-2.36.1/libsmartcols/samples/grouping-simple.c Examining data/util-linux-2.36.1/libsmartcols/samples/maxout.c Examining data/util-linux-2.36.1/libsmartcols/samples/title.c Examining data/util-linux-2.36.1/libsmartcols/samples/wrap.c Examining data/util-linux-2.36.1/libsmartcols/src/print.c Examining data/util-linux-2.36.1/libsmartcols/src/calculate.c Examining data/util-linux-2.36.1/libsmartcols/src/walk.c Examining data/util-linux-2.36.1/libsmartcols/src/cell.c Examining data/util-linux-2.36.1/libsmartcols/src/buffer.c Examining data/util-linux-2.36.1/libsmartcols/src/smartcolsP.h Examining data/util-linux-2.36.1/libsmartcols/src/version.c Examining data/util-linux-2.36.1/libsmartcols/src/table.c Examining data/util-linux-2.36.1/libsmartcols/src/print-api.c Examining data/util-linux-2.36.1/libsmartcols/src/init.c Examining data/util-linux-2.36.1/libsmartcols/src/iter.c Examining data/util-linux-2.36.1/libsmartcols/src/line.c Examining data/util-linux-2.36.1/libsmartcols/src/grouping.c Examining data/util-linux-2.36.1/libsmartcols/src/column.c Examining data/util-linux-2.36.1/libsmartcols/src/symbols.c Examining data/util-linux-2.36.1/libsmartcols/src/fput.c Examining data/util-linux-2.36.1/include/env.h Examining data/util-linux-2.36.1/include/rpmatch.h Examining data/util-linux-2.36.1/include/md5.h Examining data/util-linux-2.36.1/include/plymouth-ctrl.h Examining data/util-linux-2.36.1/include/swapprober.h Examining data/util-linux-2.36.1/include/optutils.h Examining data/util-linux-2.36.1/include/path.h Examining data/util-linux-2.36.1/include/loopdev.h Examining data/util-linux-2.36.1/include/idcache.h Examining data/util-linux-2.36.1/include/debugobj.h Examining data/util-linux-2.36.1/include/ttyutils.h Examining data/util-linux-2.36.1/include/c.h Examining data/util-linux-2.36.1/include/match.h Examining data/util-linux-2.36.1/include/linux_version.h Examining data/util-linux-2.36.1/include/pidfd-utils.h Examining data/util-linux-2.36.1/include/procutils.h Examining data/util-linux-2.36.1/include/xalloc.h Examining data/util-linux-2.36.1/include/bitops.h Examining data/util-linux-2.36.1/include/timer.h Examining data/util-linux-2.36.1/include/timeutils.h Examining data/util-linux-2.36.1/include/exitcodes.h Examining data/util-linux-2.36.1/include/mbsedit.h Examining data/util-linux-2.36.1/include/pwdutils.h Examining data/util-linux-2.36.1/include/widechar.h Examining data/util-linux-2.36.1/include/fileutils.h Examining data/util-linux-2.36.1/include/nls.h Examining data/util-linux-2.36.1/include/partx.h Examining data/util-linux-2.36.1/include/encode.h Examining data/util-linux-2.36.1/include/colors.h Examining data/util-linux-2.36.1/include/swapheader.h Examining data/util-linux-2.36.1/include/minix.h Examining data/util-linux-2.36.1/include/sha1.h Examining data/util-linux-2.36.1/include/pt-sun.h Examining data/util-linux-2.36.1/include/pathnames.h Examining data/util-linux-2.36.1/include/pty-session.h Examining data/util-linux-2.36.1/include/statfs_magic.h Examining data/util-linux-2.36.1/include/ismounted.h Examining data/util-linux-2.36.1/include/debug.h Examining data/util-linux-2.36.1/include/monotonic.h Examining data/util-linux-2.36.1/include/pt-mbr.h Examining data/util-linux-2.36.1/include/crc32.h Examining data/util-linux-2.36.1/include/namespace.h Examining data/util-linux-2.36.1/include/strv.h Examining data/util-linux-2.36.1/include/all-io.h Examining data/util-linux-2.36.1/include/color-names.h Examining data/util-linux-2.36.1/include/iso9660.h Examining data/util-linux-2.36.1/include/pager.h Examining data/util-linux-2.36.1/include/randutils.h Examining data/util-linux-2.36.1/include/pt-bsd.h Examining data/util-linux-2.36.1/include/exec_shell.h Examining data/util-linux-2.36.1/include/canonicalize.h Examining data/util-linux-2.36.1/include/caputils.h Examining data/util-linux-2.36.1/include/cctype.h Examining data/util-linux-2.36.1/include/mangle.h Examining data/util-linux-2.36.1/include/closestream.h Examining data/util-linux-2.36.1/include/mbsalign.h Examining data/util-linux-2.36.1/include/crc32c.h Examining data/util-linux-2.36.1/include/blkdev.h Examining data/util-linux-2.36.1/include/carefulputc.h Examining data/util-linux-2.36.1/include/sysfs.h Examining data/util-linux-2.36.1/include/pt-mbr-partnames.h Examining data/util-linux-2.36.1/include/cpuset.h Examining data/util-linux-2.36.1/include/strutils.h Examining data/util-linux-2.36.1/include/pt-gpt-partnames.h Examining data/util-linux-2.36.1/include/list.h Examining data/util-linux-2.36.1/include/signames.h Examining data/util-linux-2.36.1/include/setproctitle.h Examining data/util-linux-2.36.1/include/pt-sgi.h Examining data/util-linux-2.36.1/login-utils/selinux_utils.h Examining data/util-linux-2.36.1/login-utils/setpwnam.c Examining data/util-linux-2.36.1/login-utils/last.c Examining data/util-linux-2.36.1/login-utils/islocal.c Examining data/util-linux-2.36.1/login-utils/selinux_utils.c Examining data/util-linux-2.36.1/login-utils/auth.h Examining data/util-linux-2.36.1/login-utils/newgrp.c Examining data/util-linux-2.36.1/login-utils/sulogin-consoles.h Examining data/util-linux-2.36.1/login-utils/sulogin-consoles.c Examining data/util-linux-2.36.1/login-utils/vipw.c Examining data/util-linux-2.36.1/login-utils/sulogin.c Examining data/util-linux-2.36.1/login-utils/islocal.h Examining data/util-linux-2.36.1/login-utils/su.c Examining data/util-linux-2.36.1/login-utils/utmpdump.c Examining data/util-linux-2.36.1/login-utils/setpwnam.h Examining data/util-linux-2.36.1/login-utils/su-common.h Examining data/util-linux-2.36.1/login-utils/nologin.c Examining data/util-linux-2.36.1/login-utils/ch-common.h Examining data/util-linux-2.36.1/login-utils/chsh.c Examining data/util-linux-2.36.1/login-utils/libuser.c Examining data/util-linux-2.36.1/login-utils/logindefs.c Examining data/util-linux-2.36.1/login-utils/auth.c Examining data/util-linux-2.36.1/login-utils/logindefs.h Examining data/util-linux-2.36.1/login-utils/runuser.c Examining data/util-linux-2.36.1/login-utils/login.c Examining data/util-linux-2.36.1/login-utils/su-common.c Examining data/util-linux-2.36.1/login-utils/libuser.h Examining data/util-linux-2.36.1/login-utils/chfn.c Examining data/util-linux-2.36.1/login-utils/lslogins.c Examining data/util-linux-2.36.1/login-utils/ch-common.c Examining data/util-linux-2.36.1/disk-utils/sfdisk.c Examining data/util-linux-2.36.1/disk-utils/fdisk.h Examining data/util-linux-2.36.1/disk-utils/mkfs.c Examining data/util-linux-2.36.1/disk-utils/resizepart.c Examining data/util-linux-2.36.1/disk-utils/fsck.c Examining data/util-linux-2.36.1/disk-utils/blockdev.c Examining data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c Examining data/util-linux-2.36.1/disk-utils/fdisk.c Examining data/util-linux-2.36.1/disk-utils/raw.c Examining data/util-linux-2.36.1/disk-utils/cfdisk.c Examining data/util-linux-2.36.1/disk-utils/partx.c Examining data/util-linux-2.36.1/disk-utils/addpart.c Examining data/util-linux-2.36.1/disk-utils/fsck.minix.c Examining data/util-linux-2.36.1/disk-utils/mkfs.bfs.c Examining data/util-linux-2.36.1/disk-utils/minix_programs.h Examining data/util-linux-2.36.1/disk-utils/swaplabel.c Examining data/util-linux-2.36.1/disk-utils/mkswap.c Examining data/util-linux-2.36.1/disk-utils/fdformat.c Examining data/util-linux-2.36.1/disk-utils/delpart.c Examining data/util-linux-2.36.1/disk-utils/cramfs_common.c Examining data/util-linux-2.36.1/disk-utils/cramfs.h Examining data/util-linux-2.36.1/disk-utils/isosize.c Examining data/util-linux-2.36.1/disk-utils/fdisk-list.h Examining data/util-linux-2.36.1/disk-utils/fsck.cramfs.c Examining data/util-linux-2.36.1/disk-utils/fdisk-menu.c Examining data/util-linux-2.36.1/disk-utils/mkfs.minix.c Examining data/util-linux-2.36.1/disk-utils/fdisk-list.c Examining data/util-linux-2.36.1/tests/helpers/test_sysinfo.c Examining data/util-linux-2.36.1/tests/helpers/test_mbsencode.c Examining data/util-linux-2.36.1/tests/helpers/test_byteswap.c Examining data/util-linux-2.36.1/tests/helpers/test_tiocsti.c Examining data/util-linux-2.36.1/tests/helpers/test_sha1.c Examining data/util-linux-2.36.1/tests/helpers/test_uuid_namespace.c Examining data/util-linux-2.36.1/tests/helpers/test_strerror.c Examining data/util-linux-2.36.1/tests/helpers/test_md5.c Examining data/util-linux-2.36.1/tests/helpers/test_pathnames.c Examining data/util-linux-2.36.1/tests/helpers/test_sigreceive.c Examining data/util-linux-2.36.1/term-utils/script.c Examining data/util-linux-2.36.1/term-utils/script-playutils.h Examining data/util-linux-2.36.1/term-utils/setterm.c Examining data/util-linux-2.36.1/term-utils/agetty.c Examining data/util-linux-2.36.1/term-utils/ttymsg.h Examining data/util-linux-2.36.1/term-utils/scriptlive.c Examining data/util-linux-2.36.1/term-utils/mesg.c Examining data/util-linux-2.36.1/term-utils/ttymsg.c Examining data/util-linux-2.36.1/term-utils/scriptreplay.c Examining data/util-linux-2.36.1/term-utils/wall.c Examining data/util-linux-2.36.1/term-utils/write.c Examining data/util-linux-2.36.1/term-utils/script-playutils.c Examining data/util-linux-2.36.1/libfdisk/samples/mkpart-fullspec.c Examining data/util-linux-2.36.1/libfdisk/samples/mkpart.c Examining data/util-linux-2.36.1/libfdisk/src/script.c Examining data/util-linux-2.36.1/libfdisk/src/gpt.c Examining data/util-linux-2.36.1/libfdisk/src/dos.c Examining data/util-linux-2.36.1/libfdisk/src/partition.c Examining data/util-linux-2.36.1/libfdisk/src/sgi.c Examining data/util-linux-2.36.1/libfdisk/src/bsd.c Examining data/util-linux-2.36.1/libfdisk/src/field.c Examining data/util-linux-2.36.1/libfdisk/src/version.c Examining data/util-linux-2.36.1/libfdisk/src/label.c Examining data/util-linux-2.36.1/libfdisk/src/table.c Examining data/util-linux-2.36.1/libfdisk/src/item.c Examining data/util-linux-2.36.1/libfdisk/src/context.c Examining data/util-linux-2.36.1/libfdisk/src/ask.c Examining data/util-linux-2.36.1/libfdisk/src/init.c Examining data/util-linux-2.36.1/libfdisk/src/iter.c Examining data/util-linux-2.36.1/libfdisk/src/alignment.c Examining data/util-linux-2.36.1/libfdisk/src/utils.c Examining data/util-linux-2.36.1/libfdisk/src/fdiskP.h Examining data/util-linux-2.36.1/libfdisk/src/parttype.c Examining data/util-linux-2.36.1/libfdisk/src/test.c Examining data/util-linux-2.36.1/libfdisk/src/sun.c Examining data/util-linux-2.36.1/libfdisk/src/wipe.c Examining data/util-linux-2.36.1/libmount/src/lock.c Examining data/util-linux-2.36.1/libmount/src/cache.c Examining data/util-linux-2.36.1/libmount/src/tab_diff.c Examining data/util-linux-2.36.1/libmount/src/context_loopdev.c Examining data/util-linux-2.36.1/libmount/src/tab_parse.c Examining data/util-linux-2.36.1/libmount/src/btrfs.c Examining data/util-linux-2.36.1/libmount/src/tab.c Examining data/util-linux-2.36.1/libmount/src/fs.c Examining data/util-linux-2.36.1/libmount/src/tab_update.c Examining data/util-linux-2.36.1/libmount/src/version.c Examining data/util-linux-2.36.1/libmount/src/context.c Examining data/util-linux-2.36.1/libmount/src/context_veritydev.c Examining data/util-linux-2.36.1/libmount/src/init.c Examining data/util-linux-2.36.1/libmount/src/mountP.h Examining data/util-linux-2.36.1/libmount/src/iter.c Examining data/util-linux-2.36.1/libmount/src/utils.c Examining data/util-linux-2.36.1/libmount/src/context_umount.c Examining data/util-linux-2.36.1/libmount/src/optstr.c Examining data/util-linux-2.36.1/libmount/src/monitor.c Examining data/util-linux-2.36.1/libmount/src/test.c Examining data/util-linux-2.36.1/libmount/src/optmap.c Examining data/util-linux-2.36.1/libmount/src/context_mount.c Examining data/util-linux-2.36.1/libmount/python/tab.c Examining data/util-linux-2.36.1/libmount/python/fs.c Examining data/util-linux-2.36.1/libmount/python/pylibmount.h Examining data/util-linux-2.36.1/libmount/python/context.c Examining data/util-linux-2.36.1/libmount/python/pylibmount.c Examining data/util-linux-2.36.1/Documentation/boilerplate.c Examining data/util-linux-2.36.1/schedutils/taskset.c Examining data/util-linux-2.36.1/schedutils/chrt.c Examining data/util-linux-2.36.1/schedutils/ionice.c FINAL RESULTS: data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:375:16: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. #define lchown chown data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:431:42: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (((S_ISUID | S_ISGID) & i->mode) && chmod(path, i->mode) < 0) data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:161:7: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. if (readlink(path, start, size) < 0) { data/util-linux-2.36.1/lib/path.c:550:10: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. return readlink(p, buf, bufsiz); data/util-linux-2.36.1/lib/sysfs.c:361:8: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. sz = readlink(chain, buf, bufsz - 1); data/util-linux-2.36.1/lib/sysfs.c:818:8: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. len = readlink(path, linkc, sizeof(linkc) - 1); data/util-linux-2.36.1/login-utils/login.c:418:7: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. if (chown(cxt->vcsn, uid, gid)) /* vcs */ data/util-linux-2.36.1/login-utils/login.c:420:7: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(cxt->vcsn, cxt->tty_mode)) data/util-linux-2.36.1/login-utils/login.c:423:7: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. if (chown(cxt->vcsan, uid, gid)) /* vcsa */ data/util-linux-2.36.1/login-utils/login.c:425:7: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(cxt->vcsan, cxt->tty_mode)) data/util-linux-2.36.1/misc-utils/namei.c:88:7: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. sz = readlink(path, sym, sizeof(sym)); data/util-linux-2.36.1/misc-utils/rename.c:128:6: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. if (readlink(s, target, sb.st_size + 1) < 0) { data/util-linux-2.36.1/Documentation/boilerplate.c:58:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(25)); /* char offset to align option descriptions */ data/util-linux-2.36.1/Documentation/boilerplate.c:59:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("fixme-command-name(1)")); data/util-linux-2.36.1/disk-utils/addpart.c:22:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/disk-utils/addpart.c:23:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("addpart(8)")); data/util-linux-2.36.1/disk-utils/blockdev.c:200:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/disk-utils/blockdev.c:215:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("blockdev(8)")); data/util-linux-2.36.1/disk-utils/blockdev.c:444:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(device, "/dev/%s", ptname); data/util-linux-2.36.1/disk-utils/blockdev.c:481:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(start_str, "%10s", _("N/A")); data/util-linux-2.36.1/disk-utils/cfdisk.c:718:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, ap); data/util-linux-2.36.1/disk-utils/cfdisk.c:737:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt_m, ap); data/util-linux-2.36.1/disk-utils/cfdisk.c:757:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, ap); data/util-linux-2.36.1/disk-utils/cfdisk.c:771:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, ap); data/util-linux-2.36.1/disk-utils/cfdisk.c:787:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stdout, fmt, ap); data/util-linux-2.36.1/disk-utils/cfdisk.c:806:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stdout, fmt, ap); data/util-linux-2.36.1/disk-utils/cfdisk.c:2672:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(26)); data/util-linux-2.36.1/disk-utils/cfdisk.c:2674:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("cfdisk(8)")); data/util-linux-2.36.1/disk-utils/cfdisk.c:2745:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(default_disks[i], F_OK) == 0) { data/util-linux-2.36.1/disk-utils/delpart.c:22:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/disk-utils/delpart.c:23:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("delpart(8)")); data/util-linux-2.36.1/disk-utils/fdformat.c:160:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(19)); data/util-linux-2.36.1/disk-utils/fdformat.c:161:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("fdformat(8)")); data/util-linux-2.36.1/disk-utils/fdisk-list.c:442:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, USAGE_COLUMNS); data/util-linux-2.36.1/disk-utils/fdisk.c:889:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(31)); data/util-linux-2.36.1/disk-utils/fdisk.c:893:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("fdisk(8)")); data/util-linux-2.36.1/disk-utils/fsck.c:352:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(FSCK_RUNTIME_DIRNAME, F_OK) != 0) { data/util-linux-2.36.1/disk-utils/fsck.c:500:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(path, F_OK) == 0) { data/util-linux-2.36.1/disk-utils/fsck.c:554:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(prog, X_OK) == 0) data/util-linux-2.36.1/disk-utils/fsck.c:691:3: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execv(progpath, argv); data/util-linux-2.36.1/disk-utils/fsck.c:1412:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("fsck(8)")); data/util-linux-2.36.1/disk-utils/fsck.c:1465:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(_PATH_PROC_PARTITIONS, R_OK) < 0) { data/util-linux-2.36.1/disk-utils/fsck.c:1629:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(UTIL_LINUX_VERSION); data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:123:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(26)); data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:125:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("fsck.cramfs(8)")); data/util-linux-2.36.1/disk-utils/fsck.minix.c:195:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(18)); data/util-linux-2.36.1/disk-utils/fsck.minix.c:196:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("fsck.minix(8)")); data/util-linux-2.36.1/disk-utils/fsck.minix.c:207:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, UTIL_LINUX_VERSION); data/util-linux-2.36.1/disk-utils/fsck.minix.c:209:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, ap); data/util-linux-2.36.1/disk-utils/fsck.minix.c:252:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(def ? _("%s (y/n)? ") : _("%s (n/y)? "), string); data/util-linux-2.36.1/disk-utils/isosize.c:109:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(25)); data/util-linux-2.36.1/disk-utils/isosize.c:110:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("isosize(8)")); data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:88:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(21)); data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:90:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("mkfs.bfs(8)")); data/util-linux-2.36.1/disk-utils/mkfs.c:58:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(20)); data/util-linux-2.36.1/disk-utils/mkfs.c:60:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("mkfs(8)")); data/util-linux-2.36.1/disk-utils/mkfs.c:122:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(UTIL_LINUX_VERSION); data/util-linux-2.36.1/disk-utils/mkfs.c:132:2: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(progname, argv + optind); data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:146:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:147:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("mkfs.cramfs(8)")); data/util-linux-2.36.1/disk-utils/mkfs.minix.c:148:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(25)); data/util-linux-2.36.1/disk-utils/mkfs.minix.c:149:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("mkfs.minix(8)")); data/util-linux-2.36.1/disk-utils/mkfs.minix.c:566:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(P_("%lu inode\n", "%lu inodes\n", inodes), inodes); data/util-linux-2.36.1/disk-utils/mkfs.minix.c:567:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(P_("%lu block\n", "%lu blocks\n", zones), zones); data/util-linux-2.36.1/disk-utils/mkfs.minix.c:641:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(P_("%d bad block\n", "%d bad blocks\n", ctl->fs_bad_blocks), ctl->fs_bad_blocks); data/util-linux-2.36.1/disk-utils/mkfs.minix.c:665:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(P_("%d bad block\n", "%d bad blocks\n", ctl->fs_bad_blocks), ctl->fs_bad_blocks); data/util-linux-2.36.1/disk-utils/mkswap.c:167:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(27)); data/util-linux-2.36.1/disk-utils/mkswap.c:169:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("mkswap(8)")); data/util-linux-2.36.1/disk-utils/mkswap.c:208:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(P_("%lu bad page\n", "%lu bad pages\n", ctl->nbadpages), ctl->nbadpages); data/util-linux-2.36.1/disk-utils/partx.c:229:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(path, sizeof(path), _PATH_SYS_DEVBLOCK "/%d:%d/", data/util-linux-2.36.1/disk-utils/partx.c:564:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(P_("#%2d: %9ju-%9ju (%9ju sector, %6ju MB)\n", data/util-linux-2.36.1/disk-utils/partx.c:779:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(22)); data/util-linux-2.36.1/disk-utils/partx.c:785:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("partx(8)")); data/util-linux-2.36.1/disk-utils/raw.c:62:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/disk-utils/raw.c:63:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("raw(8)")); data/util-linux-2.36.1/disk-utils/raw.c:159:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. rc = sscanf(raw_name, _PATH_RAWDEVDIR "raw%d", &raw_minor); data/util-linux-2.36.1/disk-utils/resizepart.c:27:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/disk-utils/resizepart.c:28:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("resizepart(8)")); data/util-linux-2.36.1/disk-utils/sfdisk.c:2082:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("sfdisk(8)")); data/util-linux-2.36.1/disk-utils/swaplabel.c:133:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(21)); data/util-linux-2.36.1/disk-utils/swaplabel.c:134:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("swaplabel(8)")); data/util-linux-2.36.1/include/c.h:212:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, argp); data/util-linux-2.36.1/include/c.h:376:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(UTIL_LINUX_VERSION); \ data/util-linux-2.36.1/include/debug.h:117:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, mesg, ap); data/util-linux-2.36.1/include/debugobj.h:17:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, mesg, ap); data/util-linux-2.36.1/include/xalloc.h:97:27: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. __attribute__((__format__(printf, 2, 3))) data/util-linux-2.36.1/include/xalloc.h:112:27: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. __attribute__((__format__(printf, 2, 0))) data/util-linux-2.36.1/lib/canonicalize.c:48:3: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(path, sizeof(path), _PATH_DEV_MAPPER "/%s", name); data/util-linux-2.36.1/lib/canonicalize.c:50:30: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ((prefix && *prefix) || access(path, F_OK) == 0) data/util-linux-2.36.1/lib/colors.c:341:3: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, bufsz, "%s/" _PATH_TERMCOLORS_DIRNAME, p); data/util-linux-2.36.1/lib/colors.c:347:3: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, bufsz, "%s/.config/" _PATH_TERMCOLORS_DIRNAME, p); data/util-linux-2.36.1/lib/env.c:120:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(copy, *bad); data/util-linux-2.36.1/lib/env.c:128:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(copy, *bad); data/util-linux-2.36.1/lib/exec_shell.c:47:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(arg0 + 1, shell_basename); data/util-linux-2.36.1/lib/exec_shell.c:49:2: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(shell, arg0, (char *)NULL); data/util-linux-2.36.1/lib/ismounted.c:195:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access("/proc/mounts", R_OK) == 0) { data/util-linux-2.36.1/lib/pager.c:84:3: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(cmd->argv[0], (char *const*) cmd->argv); data/util-linux-2.36.1/lib/pager.c:184:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. rc = access(cmd, X_OK) == 0; data/util-linux-2.36.1/lib/path.c:209:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return access(path, F_OK) == 0; data/util-linux-2.36.1/lib/path.c:252:7: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. rc = vsnprintf(pc->path_buffer, sizeof(pc->path_buffer), path, ap); data/util-linux-2.36.1/lib/path.c:309:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. rc = access(path, mode); data/util-linux-2.36.1/lib/path.c:699:7: [4] (buffer) vfscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. rc = vfscanf(f, fmt, fmt_ap); data/util-linux-2.36.1/lib/path.c:717:7: [4] (buffer) vfscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. rc = vfscanf(f, fmt, fmt_ap); data/util-linux-2.36.1/lib/path.c:887:8: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. len = snprintf(buf, sizeof(buf), "%" PRId64, num); data/util-linux-2.36.1/lib/path.c:909:8: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. len = snprintf(buf, sizeof(buf), "%" PRIu64, num); data/util-linux-2.36.1/lib/pty-session.c:691:4: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(shell, shname, "-c", command, (char *)NULL); data/util-linux-2.36.1/lib/pty-session.c:693:4: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(shell, shname, "-i", (char *)NULL); data/util-linux-2.36.1/lib/pwdutils.c:109:9: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. user = getlogin(); data/util-linux-2.36.1/lib/randutils.c:198:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access(random_sources[i], R_OK)) data/util-linux-2.36.1/lib/setproctitle.c:64:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s -- %s", prog, txt); data/util-linux-2.36.1/lib/setproctitle.c:72:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(argv0[0], buf); data/util-linux-2.36.1/lib/strutils.c:646:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. len = snprintf(buf, sizeof(buf), "%d%s%02" PRIu64, dec, dp, frac); data/util-linux-2.36.1/lib/sysfs.c:80:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, sizeof(buf), _PATH_SYS_DEVBLOCK "/%d:%d", major(devno), minor(devno)); data/util-linux-2.36.1/libblkid/src/dev.c:165:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(new_type, search_type); data/util-linux-2.36.1/libblkid/src/dev.c:166:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(new_value, search_value); data/util-linux-2.36.1/libblkid/src/devname.c:89:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(devname, F_OK) < 0) data/util-linux-2.36.1/libblkid/src/devname.c:166:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "/sys/block/%s/slaves", de->d_name); data/util-linux-2.36.1/libblkid/src/devname.c:199:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (only_if_new && !access(tmp->bid_name, F_OK)) data/util-linux-2.36.1/libblkid/src/devname.c:330:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vdirname, "%s/%s/LVs", VG_DIR, vg_name); data/util-linux-2.36.1/libblkid/src/devname.c:350:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lvm_device, "%s/%s/LVs/%s", VG_DIR, vg_name, data/util-linux-2.36.1/libblkid/src/devname.c:353:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lvm_device, "%s/%s", vg_name, lv_name); data/util-linux-2.36.1/libblkid/src/devno.c:346:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, errmsg, "device number", argv[1]); data/util-linux-2.36.1/libblkid/src/devno.c:352:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, errmsg, "major number", argv[1]); data/util-linux-2.36.1/libblkid/src/devno.c:357:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, errmsg, "minor number", argv[2]); data/util-linux-2.36.1/libblkid/src/evaluate.c:148:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dev, _PATH_DEV_BYUUID "/"); data/util-linux-2.36.1/libblkid/src/evaluate.c:150:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dev, _PATH_DEV_BYLABEL "/"); data/util-linux-2.36.1/libblkid/src/evaluate.c:152:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dev, _PATH_DEV_BYPARTLABEL "/"); data/util-linux-2.36.1/libblkid/src/evaluate.c:154:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dev, _PATH_DEV_BYPARTUUID "/"); data/util-linux-2.36.1/libblkid/src/evaluate.c:156:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dev, _PATH_DEV_BYID "/"); data/util-linux-2.36.1/libblkid/src/save.c:118:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. (ret == 0 && access(filename, W_OK) < 0)) { data/util-linux-2.36.1/libblkid/src/save.c:133:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp, "%s-XXXXXX", filename); data/util-linux-2.36.1/libblkid/src/save.c:184:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(backup, "%s.old", filename); data/util-linux-2.36.1/libblkid/src/tag.c:350:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. !access(tmp->bit_dev->bid_name, F_OK)) { data/util-linux-2.36.1/libblkid/src/topology/dm.c:93:3: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execv(dmargv[0], (char * const *) dmargv); data/util-linux-2.36.1/libblkid/src/topology/lvm.c:95:3: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execv(lvargv[0], lvargv); data/util-linux-2.36.1/libfdisk/src/script.c:490:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, sizeof(buf), "%"PRIu64, item.data.num64); data/util-linux-2.36.1/libfdisk/src/script.c:498:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, sizeof(buf), "%"PRIu64, item.data.num64); data/util-linux-2.36.1/libfdisk/src/utils.c:160:14: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (res && access(res, F_OK) == 0) data/util-linux-2.36.1/libfdisk/src/utils.c:168:14: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (res && access(res, F_OK) == 0) data/util-linux-2.36.1/libmount/python/pylibmount.h:35:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, mesg, ap); data/util-linux-2.36.1/libmount/python/pylibmount.h:48:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, mesg, ap); data/util-linux-2.36.1/libmount/src/context.c:2003:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(dev, F_OK) == 0) { data/util-linux-2.36.1/libmount/src/context.c:2690:22: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. if (buf && bufsz && vsnprintf(buf, bufsz, fmt, va) < 0) data/util-linux-2.36.1/libmount/src/context_mount.c:317:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access("/sys/fs/smackfs", F_OK) != 0) data/util-linux-2.36.1/libmount/src/context_mount.c:690:3: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execv(cxt->helper, (char * const *) args); data/util-linux-2.36.1/libmount/src/context_mount.c:1689:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, bufsz, restricted ? data/util-linux-2.36.1/libmount/src/context_mount.c:1705:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, bufsz, errno ? data/util-linux-2.36.1/libmount/src/context_umount.c:733:3: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execv(cxt->helper, (char * const *) args); data/util-linux-2.36.1/libmount/src/context_veritydev.c:126:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(mapper_device, backing_file_basename); data/util-linux-2.36.1/libmount/src/context_veritydev.c:376:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(mapper_device_full, mapper_device); data/util-linux-2.36.1/libmount/src/utils.c:216:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(path, W_OK) == 0) data/util-linux-2.36.1/libsmartcols/src/buffer.c:127:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf->encdata, data); data/util-linux-2.36.1/libuuid/src/gen_uuid.c:539:10: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return (access("/dev/random", R_OK) == 0 || data/util-linux-2.36.1/libuuid/src/gen_uuid.c:540:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access("/dev/urandom", R_OK) == 0); data/util-linux-2.36.1/login-utils/chfn.c:109:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("chfn(1)")); data/util-linux-2.36.1/login-utils/chsh.c:86:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("chsh(1)")); data/util-linux-2.36.1/login-utils/chsh.c:232:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(shell, F_OK) < 0) data/util-linux-2.36.1/login-utils/chsh.c:234:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(shell, X_OK) < 0) data/util-linux-2.36.1/login-utils/last.c:597:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(22)); data/util-linux-2.36.1/login-utils/last.c:598:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("last(1)")); data/util-linux-2.36.1/login-utils/last.c:616:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(path, R_OK) == 0) { data/util-linux-2.36.1/login-utils/last.c:777:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ut.ut_line, data/util-linux-2.36.1/login-utils/login.c:454:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access(cxt->tty_path, R_OK | W_OK) != 0) { data/util-linux-2.36.1/login-utils/login.c:1186:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("login(1)")); data/util-linux-2.36.1/login-utils/login.c:1444:2: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(childArgv[0], childArgv + 1); data/util-linux-2.36.1/login-utils/logindefs.c:524:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s/%s", pwd->pw_dir, file); data/util-linux-2.36.1/login-utils/lslogins.c:855:21: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. user->nologin = access(_PATH_NOLOGIN, F_OK) == 0 || data/util-linux-2.36.1/login-utils/lslogins.c:856:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access(_PATH_VAR_NOLOGIN, F_OK) == 0; data/util-linux-2.36.1/login-utils/lslogins.c:1408:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(26)); data/util-linux-2.36.1/login-utils/lslogins.c:1414:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("lslogins(1)")); data/util-linux-2.36.1/login-utils/newgrp.c:151:16: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. char *cbuf = crypt(xpwd, pwd); data/util-linux-2.36.1/login-utils/newgrp.c:179:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/login-utils/newgrp.c:180:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("newgrp(1)")); data/util-linux-2.36.1/login-utils/newgrp.c:237:2: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(shell, shell, (char *)NULL); data/util-linux-2.36.1/login-utils/nologin.c:34:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(26)); data/util-linux-2.36.1/login-utils/nologin.c:36:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("nologin(8)")); data/util-linux-2.36.1/login-utils/su-common.c:806:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(arg0 + 1, shell_basename); data/util-linux-2.36.1/login-utils/su-common.c:820:2: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execv(shell, (char **)args); data/util-linux-2.36.1/login-utils/su-common.c:863:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(33)); data/util-linux-2.36.1/login-utils/su-common.c:884:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stdout, USAGE_MAN_TAIL("runuser(1)")); data/util-linux-2.36.1/login-utils/su-common.c:901:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stdout, USAGE_MAN_TAIL("su(1)")); data/util-linux-2.36.1/login-utils/su-common.c:1213:2: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(argv[optind], &argv[optind]); data/util-linux-2.36.1/login-utils/sulogin-consoles.c:82:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, mesg, ap); data/util-linux-2.36.1/login-utils/sulogin-consoles.c:335:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tail->tty, name); data/util-linux-2.36.1/login-utils/sulogin.c:753:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(shell, sizeof(shell), profile ? "-%s" : "%s", p); data/util-linux-2.36.1/login-utils/sulogin.c:792:2: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(su_shell, shell, (char *)NULL); data/util-linux-2.36.1/login-utils/sulogin.c:796:2: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl("/bin/sh", profile ? "-sh" : "sh", (char *)NULL); data/util-linux-2.36.1/login-utils/sulogin.c:817:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(26)); data/util-linux-2.36.1/login-utils/sulogin.c:818:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("sulogin(8)")); data/util-linux-2.36.1/login-utils/sulogin.c:995:17: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. cryptbuf = crypt(answer, passwd); data/util-linux-2.36.1/login-utils/utmpdump.c:314:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(22)); data/util-linux-2.36.1/login-utils/utmpdump.c:316:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("utmpdump(1)")); data/util-linux-2.36.1/login-utils/vipw.c:157:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp, "%s%s", orig_file, ".OLD"); data/util-linux-2.36.1/login-utils/vipw.c:211:3: [4] (shell) execlp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execlp(editor, p, tmp_file, (char *)NULL); data/util-linux-2.36.1/login-utils/vipw.c:311:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/login-utils/vipw.c:312:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("vipw(8)")); data/util-linux-2.36.1/login-utils/vipw.c:356:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(orig_file, F_OK) == 0) { data/util-linux-2.36.1/misc-utils/blkid.c:100:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(28)); data/util-linux-2.36.1/misc-utils/blkid.c:103:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_ARG_SIZE(_("<size> and <offset>"))); data/util-linux-2.36.1/misc-utils/blkid.c:107:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("blkid(8)")); data/util-linux-2.36.1/misc-utils/blkid.c:214:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(devname, F_OK)) data/util-linux-2.36.1/misc-utils/cal.c:1310:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(23)); data/util-linux-2.36.1/misc-utils/cal.c:1311:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("cal(1)")); data/util-linux-2.36.1/misc-utils/fincore.c:272:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(23)); data/util-linux-2.36.1/misc-utils/fincore.c:274:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, USAGE_COLUMNS); data/util-linux-2.36.1/misc-utils/fincore.c:279:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("fincore(1)")); data/util-linux-2.36.1/misc-utils/findfs.c:35:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/misc-utils/findfs.c:36:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("findfs(8)")); data/util-linux-2.36.1/misc-utils/findmnt-verify.c:43:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stdout, fmt, ap); data/util-linux-2.36.1/misc-utils/findmnt-verify.c:519:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, P_("%d parse error", "%d parse errors", parse_nerrors), parse_nerrors); data/util-linux-2.36.1/misc-utils/findmnt-verify.c:520:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, P_(", %d error", ", %d errors", vfy.nerrors), vfy.nerrors); data/util-linux-2.36.1/misc-utils/findmnt-verify.c:521:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, P_(", %d warning", ", %d warnings", vfy.nwarnings), vfy.nwarnings); data/util-linux-2.36.1/misc-utils/findmnt.c:841:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. path = access(_PATH_PROC_MOUNTINFO, R_OK) == 0 ? data/util-linux-2.36.1/misc-utils/findmnt.c:871:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. path = access(_PATH_PROC_MOUNTINFO, R_OK) == 0 ? data/util-linux-2.36.1/misc-utils/findmnt.c:1267:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(24)); data/util-linux-2.36.1/misc-utils/findmnt.c:1273:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("findmnt(8)")); data/util-linux-2.36.1/misc-utils/getopt.c:349:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(31)); data/util-linux-2.36.1/misc-utils/getopt.c:350:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("getopt(1)")); data/util-linux-2.36.1/misc-utils/getopt.c:405:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ctl.optstr, argv[1] + strspn(argv[1], "-+")); data/util-linux-2.36.1/misc-utils/hardlink.c:156:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); /* char offset to align option descriptions */ data/util-linux-2.36.1/misc-utils/hardlink.c:157:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("hardlink(1)")); data/util-linux-2.36.1/misc-utils/kill.c:215:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(24)); data/util-linux-2.36.1/misc-utils/kill.c:216:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("kill(1)")); data/util-linux-2.36.1/misc-utils/logger.c:249:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s_addr.sun_path, path); data/util-linux-2.36.1/misc-utils/logger.c:401:13: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. if (!(cp = getlogin()) || !*cp) data/util-linux-2.36.1/misc-utils/logger.c:1088:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(26)); data/util-linux-2.36.1/misc-utils/logger.c:1089:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("logger(1)")); data/util-linux-2.36.1/misc-utils/look.c:107:38: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ((file = getenv("WORDLIST")) && !access(file, R_OK)) data/util-linux-2.36.1/misc-utils/look.c:371:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(26)); data/util-linux-2.36.1/misc-utils/look.c:372:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("look(1)")); data/util-linux-2.36.1/misc-utils/lsblk-mnt.c:37:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, sizeof(buf), "%s" _PATH_PROC_SWAPS, lsblk->sysroot); data/util-linux-2.36.1/misc-utils/lsblk-mnt.c:70:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, sizeof(buf), "%s" _PATH_PROC_MOUNTINFO, lsblk->sysroot); data/util-linux-2.36.1/misc-utils/lsblk.c:1796:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(22)); data/util-linux-2.36.1/misc-utils/lsblk.c:1798:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, USAGE_COLUMNS); data/util-linux-2.36.1/misc-utils/lsblk.c:1803:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("lsblk(8)")); data/util-linux-2.36.1/misc-utils/lsblk.c:1810:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(_PATH_SYS_DEVBLOCK, R_OK) != 0) data/util-linux-2.36.1/misc-utils/lslocks.c:545:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(24)); data/util-linux-2.36.1/misc-utils/lslocks.c:552:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("lslocks(8)")); data/util-linux-2.36.1/misc-utils/mcookie.c:94:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(23)); data/util-linux-2.36.1/misc-utils/mcookie.c:97:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_ARG_SIZE(_("<num>"))); data/util-linux-2.36.1/misc-utils/mcookie.c:99:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("mcookie(1)")); data/util-linux-2.36.1/misc-utils/mcookie.c:123:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, data/util-linux-2.36.1/misc-utils/mcookie.c:190:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, P_("Got %d byte from %s\n", data/util-linux-2.36.1/misc-utils/namei.c:347:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(21)); data/util-linux-2.36.1/misc-utils/namei.c:349:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("namei(1)")); data/util-linux-2.36.1/misc-utils/rename.c:192:38: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ((nooverwrite || interactive) && access(newname, F_OK) != 0) data/util-linux-2.36.1/misc-utils/rename.c:228:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(21)); data/util-linux-2.36.1/misc-utils/rename.c:229:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("rename(1)")); data/util-linux-2.36.1/misc-utils/test_uuidd.c:41:48: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define LOG(level,args) if (loglev >= level) { fprintf args; } data/util-linux-2.36.1/misc-utils/test_uuidd.c:292:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, MSG_TRY_HELP); data/util-linux-2.36.1/misc-utils/uuidd.c:79:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(25)); data/util-linux-2.36.1/misc-utils/uuidd.c:80:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("uuidd(8)")); data/util-linux-2.36.1/misc-utils/uuidd.c:485:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, P_("Generated time UUID %s " data/util-linux-2.36.1/misc-utils/uuidd.c:506:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, P_("Generated %d UUID:\n", data/util-linux-2.36.1/misc-utils/uuidd.c:665:4: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(P_("%s and %d subsequent UUID\n", data/util-linux-2.36.1/misc-utils/uuidgen.c:40:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(18)); data/util-linux-2.36.1/misc-utils/uuidgen.c:41:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("uuidgen(1)")); data/util-linux-2.36.1/misc-utils/uuidparse.c:104:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(24)); data/util-linux-2.36.1/misc-utils/uuidparse.c:110:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("uuidparse(1)")); data/util-linux-2.36.1/misc-utils/whereis.c:216:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/misc-utils/whereis.c:217:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("whereis(1)")); data/util-linux-2.36.1/misc-utils/whereis.c:226:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(dir, R_OK) != 0) data/util-linux-2.36.1/misc-utils/wipefs.c:477:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(P_("%s: %zd byte was erased at offset 0x%08jx (%s): ", data/util-linux-2.36.1/misc-utils/wipefs.c:668:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(21)); data/util-linux-2.36.1/misc-utils/wipefs.c:671:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_ARG_SIZE(_("<num>"))); data/util-linux-2.36.1/misc-utils/wipefs.c:677:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("wipefs(8)")); data/util-linux-2.36.1/schedutils/chrt.c:168:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(22)); data/util-linux-2.36.1/schedutils/chrt.c:170:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("chrt(1)")); data/util-linux-2.36.1/schedutils/chrt.c:565:3: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(argv[0], argv); data/util-linux-2.36.1/schedutils/ionice.c:124:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(24)); data/util-linux-2.36.1/schedutils/ionice.c:126:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("ionice(1)")); data/util-linux-2.36.1/schedutils/ionice.c:259:3: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(argv[optind], &argv[optind]); data/util-linux-2.36.1/schedutils/taskset.c:65:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(25)); data/util-linux-2.36.1/schedutils/taskset.c:81:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("taskset(1)")); data/util-linux-2.36.1/schedutils/taskset.c:102:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(msg, ts->pid ? ts->pid : getpid(), str); data/util-linux-2.36.1/schedutils/taskset.c:246:3: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(argv[0], argv); data/util-linux-2.36.1/sys-utils/blkdiscard.c:101:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(21)); data/util-linux-2.36.1/sys-utils/blkdiscard.c:104:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_ARG_SIZE(_("<num>"))); data/util-linux-2.36.1/sys-utils/blkdiscard.c:106:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("blkdiscard(8)")); data/util-linux-2.36.1/sys-utils/blkzone.c:345:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(_("%s: successful %s of zones in range from %" PRIu64 ", to %" PRIu64), data/util-linux-2.36.1/sys-utils/blkzone.c:376:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(24)); data/util-linux-2.36.1/sys-utils/blkzone.c:379:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_ARG_SIZE(_("<sector> and <sectors>"))); data/util-linux-2.36.1/sys-utils/blkzone.c:381:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("blkzone(8)")); data/util-linux-2.36.1/sys-utils/chcpu.c:256:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(31)); data/util-linux-2.36.1/sys-utils/chcpu.c:258:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("chcpu(8)")); data/util-linux-2.36.1/sys-utils/chmem.c:344:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(20)); data/util-linux-2.36.1/sys-utils/chmem.c:350:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("chmem(8)")); data/util-linux-2.36.1/sys-utils/choom.c:50:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(24)); data/util-linux-2.36.1/sys-utils/choom.c:51:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("choom(1)")); data/util-linux-2.36.1/sys-utils/choom.c:153:3: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(argv[0], argv); data/util-linux-2.36.1/sys-utils/ctrlaltdel.c:34:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/sys-utils/ctrlaltdel.c:35:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("ctrlaltdel(8)")); data/util-linux-2.36.1/sys-utils/dmesg.c:307:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(29)); data/util-linux-2.36.1/sys-utils/dmesg.c:320:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("dmesg(1)")); data/util-linux-2.36.1/sys-utils/eject.c:109:2: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, va); data/util-linux-2.36.1/sys-utils/eject.c:165:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(29)); data/util-linux-2.36.1/sys-utils/eject.c:168:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("eject(1)")); data/util-linux-2.36.1/sys-utils/eject.c:299:40: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ((*name == '.' || *name == '/') && access(name, F_OK) == 0) data/util-linux-2.36.1/sys-utils/eject.c:305:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(buf, F_OK) == 0) data/util-linux-2.36.1/sys-utils/eject.c:666:4: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl("/bin/umount", "/bin/umount", name, "-n", (char *)NULL); data/util-linux-2.36.1/sys-utils/eject.c:668:4: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl("/bin/umount", "/bin/umount", name, (char *)NULL); data/util-linux-2.36.1/sys-utils/fallocate.c:104:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(22)); data/util-linux-2.36.1/sys-utils/fallocate.c:107:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_ARG_SIZE(_("<num>"))); data/util-linux-2.36.1/sys-utils/fallocate.c:109:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("fallocate(1)")); data/util-linux-2.36.1/sys-utils/flock.c:73:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(26)); data/util-linux-2.36.1/sys-utils/flock.c:74:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("flock(1)")); data/util-linux-2.36.1/sys-utils/flock.c:121:2: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(cmd_argv[0], cmd_argv); data/util-linux-2.36.1/sys-utils/flock.c:306:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access(filename, R_OK | W_OK) == 0) { data/util-linux-2.36.1/sys-utils/fsfreeze.c:50:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(19)); data/util-linux-2.36.1/sys-utils/fsfreeze.c:51:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("fsfreeze(8)")); data/util-linux-2.36.1/sys-utils/fstrim.c:339:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(tgt, W_OK) != 0) { data/util-linux-2.36.1/sys-utils/fstrim.c:431:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(21)); data/util-linux-2.36.1/sys-utils/fstrim.c:434:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_ARG_SIZE(_("<num>"))); data/util-linux-2.36.1/sys-utils/fstrim.c:436:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("fstrim(8)")); data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:977:21: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define YYFPRINTF fprintf data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:3262:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (tz1buf, "XXX%s%jd:%02d", data/util-linux-2.36.1/sys-utils/hwclock.c:230:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(ctl->adj_file_name, R_OK) != 0) data/util-linux-2.36.1/sys-utils/hwclock.c:866:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(P_("Time since last adjustment is %ld second\n", data/util-linux-2.36.1/sys-utils/hwclock.c:1146:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(UTIL_LINUX_VERSION); data/util-linux-2.36.1/sys-utils/hwclock.c:1193:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(22)); data/util-linux-2.36.1/sys-utils/hwclock.c:1194:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("hwclock(8)")); data/util-linux-2.36.1/sys-utils/ipcmk.c:79:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(26)); data/util-linux-2.36.1/sys-utils/ipcmk.c:82:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_ARG_SIZE(_("<size>"))); data/util-linux-2.36.1/sys-utils/ipcmk.c:84:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("ipcmk(1)")); data/util-linux-2.36.1/sys-utils/ipcrm.c:68:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(28)); data/util-linux-2.36.1/sys-utils/ipcrm.c:69:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("ipcrm(1)")); data/util-linux-2.36.1/sys-utils/ipcs.c:68:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/sys-utils/ipcs.c:86:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("ipcs(1)")); data/util-linux-2.36.1/sys-utils/ipcutils.c:21:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(_PATH_PROC_IPC_MSGMNI, F_OK) == 0 && data/util-linux-2.36.1/sys-utils/ipcutils.c:22:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access(_PATH_PROC_IPC_MSGMNB, F_OK) == 0 && data/util-linux-2.36.1/sys-utils/ipcutils.c:23:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access(_PATH_PROC_IPC_MSGMAX, F_OK) == 0) { data/util-linux-2.36.1/sys-utils/ipcutils.c:77:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(_PATH_PROC_IPC_SHMALL, F_OK) == 0 && data/util-linux-2.36.1/sys-utils/ipcutils.c:78:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access(_PATH_PROC_IPC_SHMMAX, F_OK) == 0 && data/util-linux-2.36.1/sys-utils/ipcutils.c:79:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access(_PATH_PROC_IPC_SHMMNI, F_OK) == 0) { data/util-linux-2.36.1/sys-utils/ipcutils.c:515:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(format, size); data/util-linux-2.36.1/sys-utils/ipcutils.c:519:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(format, size / 1024); data/util-linux-2.36.1/sys-utils/ipcutils.c:525:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(format, (tmp = size_to_human_string(SIZE_SUFFIX_1LETTER, size))); data/util-linux-2.36.1/sys-utils/irqtop.c:227:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(22)); data/util-linux-2.36.1/sys-utils/irqtop.c:239:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("irqtop(1)")); data/util-linux-2.36.1/sys-utils/ldattach.c:145:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, args); data/util-linux-2.36.1/sys-utils/ldattach.c:219:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(25)); data/util-linux-2.36.1/sys-utils/ldattach.c:228:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("ldattach(8)")); data/util-linux-2.36.1/sys-utils/losetup.c:439:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(31)); data/util-linux-2.36.1/sys-utils/losetup.c:445:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("losetup(8)")); data/util-linux-2.36.1/sys-utils/losetup.c:873:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(_PATH_DEV_LOOPCTL, F_OK) == 0 && data/util-linux-2.36.1/sys-utils/losetup.c:874:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access(_PATH_DEV_LOOPCTL, W_OK) != 0) data/util-linux-2.36.1/sys-utils/lscpu.c:587:25: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (desc->arch && mod->system != SYSTEM_SNAPSHOT) { data/util-linux-2.36.1/sys-utils/lscpu.c:928:11: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (mod->system != SYSTEM_SNAPSHOT) { data/util-linux-2.36.1/sys-utils/lscpu.c:1945:40: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static void __attribute__ ((__format__(printf, 3, 4))) data/util-linux-2.36.1/sys-utils/lscpu.c:2241:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, sizeof(buf), ("Vulnerability %s:"), desc->vuls[i].name); data/util-linux-2.36.1/sys-utils/lscpu.c:2278:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(25)); data/util-linux-2.36.1/sys-utils/lscpu.c:2288:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("lscpu(1)")); data/util-linux-2.36.1/sys-utils/lscpu.h:201:7: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. int system; /* SYSTEM_* */ data/util-linux-2.36.1/sys-utils/lsipc.c:320:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(26)); data/util-linux-2.36.1/sys-utils/lsipc.c:342:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("lsipc(1)")); data/util-linux-2.36.1/sys-utils/lsipc.c:1003:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. offt += sprintf(arg, "%s", _("dest")); data/util-linux-2.36.1/sys-utils/lsipc.c:1011:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. offt += sprintf(arg + offt, "%s", _("locked")); data/util-linux-2.36.1/sys-utils/lsipc.c:1018:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. offt += sprintf(arg + offt, "%s", _("hugetlb")); data/util-linux-2.36.1/sys-utils/lsipc.c:1025:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(arg + offt, "%s", _("noreserve")); data/util-linux-2.36.1/sys-utils/lsirq.c:69:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(22)); data/util-linux-2.36.1/sys-utils/lsirq.c:74:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("lsirq(1)")); data/util-linux-2.36.1/sys-utils/lsmem.c:290:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(valid_zones, zone_names[zone_id]); data/util-linux-2.36.1/sys-utils/lsmem.c:525:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(22)); data/util-linux-2.36.1/sys-utils/lsmem.c:531:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("lsmem(1)")); data/util-linux-2.36.1/sys-utils/lsns.c:917:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(24)); data/util-linux-2.36.1/sys-utils/lsns.c:923:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("lsns(8)")); data/util-linux-2.36.1/sys-utils/mount.c:185:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(ignored == 1 ? _("%-25s: ignored\n") : data/util-linux-2.36.1/sys-utils/mount.c:487:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(25)); data/util-linux-2.36.1/sys-utils/mount.c:520:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("mount(8)")); data/util-linux-2.36.1/sys-utils/mountpoint.c:131:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(20)); data/util-linux-2.36.1/sys-utils/mountpoint.c:132:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("mountpoint(1)")); data/util-linux-2.36.1/sys-utils/nsenter.c:102:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(24)); data/util-linux-2.36.1/sys-utils/nsenter.c:103:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("nsenter(1)")); data/util-linux-2.36.1/sys-utils/nsenter.c:488:3: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(argv[optind], argv + optind); data/util-linux-2.36.1/sys-utils/pivot_root.c:41:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/sys-utils/pivot_root.c:42:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("pivot_root(8)")); data/util-linux-2.36.1/sys-utils/prlimit.c:176:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(24)); data/util-linux-2.36.1/sys-utils/prlimit.c:201:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("prlimit(1)")); data/util-linux-2.36.1/sys-utils/prlimit.c:642:3: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(argv[optind], &argv[optind]); data/util-linux-2.36.1/sys-utils/readprofile.c:71:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(cmdline, "zcat %s", name); data/util-linux-2.36.1/sys-utils/readprofile.c:72:9: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. res = popen(cmdline, mode); data/util-linux-2.36.1/sys-utils/readprofile.c:95:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, BOOT_SYSTEM_MAP); data/util-linux-2.36.1/sys-utils/readprofile.c:96:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s, uname_info.release); data/util-linux-2.36.1/sys-utils/readprofile.c:125:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(27)); data/util-linux-2.36.1/sys-utils/readprofile.c:126:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("readprofile(8)")); data/util-linux-2.36.1/sys-utils/readprofile.c:389:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fn_name, next_name); data/util-linux-2.36.1/sys-utils/renice.c:76:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(24)); data/util-linux-2.36.1/sys-utils/renice.c:77:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("renice(1)")); data/util-linux-2.36.1/sys-utils/rfkill.c:280:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(path, sizeof(path), _PATH_SYS_RFKILL "/rfkill%u/%s", idx, attr); data/util-linux-2.36.1/sys-utils/rfkill.c:316:3: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(filename, sizeof(filename) - 1, data/util-linux-2.36.1/sys-utils/rfkill.c:318:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(filename, F_OK) == 0) data/util-linux-2.36.1/sys-utils/rfkill.c:588:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(24)); data/util-linux-2.36.1/sys-utils/rfkill.c:608:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stdout, USAGE_MAN_TAIL("rfkill(8)")); data/util-linux-2.36.1/sys-utils/rtcwake.c:121:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(26)); data/util-linux-2.36.1/sys-utils/rtcwake.c:122:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("rtcwake(8)")); data/util-linux-2.36.1/sys-utils/rtcwake.c:134:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, sizeof buf, SYS_WAKEUP_PATH_TEMPLATE, devname + skip); data/util-linux-2.36.1/sys-utils/rtcwake.c:602:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access(_PATH_SHUTDOWN, X_OK)) { data/util-linux-2.36.1/sys-utils/rtcwake.c:608:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. } else if (!access(_PATH_POWEROFF, X_OK)) { data/util-linux-2.36.1/sys-utils/rtcwake.c:620:5: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execv(arg[0], arg); data/util-linux-2.36.1/sys-utils/setarch.c:123:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(26)); data/util-linux-2.36.1/sys-utils/setarch.c:124:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("setarch(8)")); data/util-linux-2.36.1/sys-utils/setarch.c:472:3: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(shell, shell_arg, (char *)NULL); data/util-linux-2.36.1/sys-utils/setarch.c:477:2: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(argv[0], argv); data/util-linux-2.36.1/sys-utils/setpriv.c:150:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(29)); data/util-linux-2.36.1/sys-utils/setpriv.c:153:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("setpriv(1)")); data/util-linux-2.36.1/sys-utils/setpriv.c:398:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(_PATH_SYS_SELINUX, F_OK) == 0) data/util-linux-2.36.1/sys-utils/setpriv.c:401:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(_PATH_SYS_APPARMOR, F_OK) == 0) { data/util-linux-2.36.1/sys-utils/setpriv.c:432:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, str); /* It's exactly the right length */ data/util-linux-2.36.1/sys-utils/setpriv.c:622:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(_PATH_SYS_SELINUX, F_OK) != 0) data/util-linux-2.36.1/sys-utils/setpriv.c:645:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(_PATH_SYS_APPARMOR, F_OK) != 0) data/util-linux-2.36.1/sys-utils/setpriv.c:1065:2: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(argv[optind], argv + optind); data/util-linux-2.36.1/sys-utils/setsid.c:44:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/sys-utils/setsid.c:46:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("setsid(1)")); data/util-linux-2.36.1/sys-utils/setsid.c:121:2: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(argv[optind], argv + optind); data/util-linux-2.36.1/sys-utils/swapoff.c:151:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(24)); data/util-linux-2.36.1/sys-utils/swapoff.c:161:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("swapoff(8)")); data/util-linux-2.36.1/sys-utils/swapon.c:182:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(data, R_OK) == 0) data/util-linux-2.36.1/sys-utils/swapon.c:342:3: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(cmd[0], (char * const *) cmd); data/util-linux-2.36.1/sys-utils/swapon.c:772:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (prop.no_fail && access(device, R_OK) != 0) { data/util-linux-2.36.1/sys-utils/swapon.c:813:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(26)); data/util-linux-2.36.1/sys-utils/swapon.c:834:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("swapon(8)")); data/util-linux-2.36.1/sys-utils/switch_root.c:212:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/sys-utils/switch_root.c:213:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("switch_root(8)")); data/util-linux-2.36.1/sys-utils/switch_root.c:256:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(init, X_OK)) data/util-linux-2.36.1/sys-utils/switch_root.c:259:2: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execv(init, initargs); data/util-linux-2.36.1/sys-utils/tunelp.c:115:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(30)); data/util-linux-2.36.1/sys-utils/tunelp.c:116:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("tunelp(8)")); data/util-linux-2.36.1/sys-utils/umount.c:109:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(25)); data/util-linux-2.36.1/sys-utils/umount.c:110:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("umount(8)")); data/util-linux-2.36.1/sys-utils/umount.c:342:10: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. warnx(access(spec, F_OK) == 0 ? data/util-linux-2.36.1/sys-utils/umount.c:366:10: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. warnx(access(spec, F_OK) == 0 ? data/util-linux-2.36.1/sys-utils/unshare.c:343:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(27)); data/util-linux-2.36.1/sys-utils/unshare.c:344:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("unshare(1)")); data/util-linux-2.36.1/sys-utils/unshare.c:706:3: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(argv[optind], argv + optind); data/util-linux-2.36.1/sys-utils/wdctl.c:192:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(*p, F_OK) == 0) data/util-linux-2.36.1/sys-utils/wdctl.c:225:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(24)); data/util-linux-2.36.1/sys-utils/wdctl.c:237:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("wdctl(8)")); data/util-linux-2.36.1/sys-utils/wdctl.c:388:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(P_("Timeout has been set to %d second.\n", data/util-linux-2.36.1/sys-utils/wdctl.c:513:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(P_("%-14s %2i second\n", "%-14s %2i seconds\n", wd->timeout), data/util-linux-2.36.1/sys-utils/wdctl.c:516:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(P_("%-14s %2i second\n", "%-14s %2i seconds\n", wd->pretimeout), data/util-linux-2.36.1/sys-utils/wdctl.c:519:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(P_("%-14s %2i second\n", "%-14s %2i seconds\n", wd->timeleft), data/util-linux-2.36.1/sys-utils/zramctl.c:277:20: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. z->has_control = access(_PATH_SYS_CLASS "/zram-control/", F_OK) == 0 ? 1 : 0; data/util-linux-2.36.1/sys-utils/zramctl.c:562:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(27)); data/util-linux-2.36.1/sys-utils/zramctl.c:565:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_ARG_SIZE(_("<size>"))); data/util-linux-2.36.1/sys-utils/zramctl.c:571:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("zramctl(8)")); data/util-linux-2.36.1/term-utils/agetty.c:336:37: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. __attribute__((__format__(printf, 1, 2))); data/util-linux-2.36.1/term-utils/agetty.c:338:31: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. __attribute__((__format__(printf, 1, 2))); data/util-linux-2.36.1/term-utils/agetty.c:356:24: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define debug(s) do { fprintf(dbf,s); fflush(dbf); } while (0) data/util-linux-2.36.1/term-utils/agetty.c:565:2: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execv(options.login, login_argv); data/util-linux-2.36.1/term-utils/agetty.c:1967:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(_PATH_ISSUE, F_OK|R_OK) == 0) { data/util-linux-2.36.1/term-utils/agetty.c:2056:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(_PATH_NUMLOCK_ON, F_OK) == 0) data/util-linux-2.36.1/term-utils/agetty.c:2479:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("agetty(8)")); data/util-linux-2.36.1/term-utils/agetty.c:2524:2: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(buf, sizeof(buf), new_fmt, ap); data/util-linux-2.36.1/term-utils/agetty.c:2821:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(ie->output, P_("%d user", "%d users", users), users); data/util-linux-2.36.1/term-utils/mesg.c:85:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/term-utils/mesg.c:86:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("mesg(1)")); data/util-linux-2.36.1/term-utils/script.c:176:14: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (!str || sscanf(str, "%"SCNi64, &sec) != 1) data/util-linux-2.36.1/term-utils/script.c:216:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(31)); data/util-linux-2.36.1/term-utils/script.c:217:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("script(1)")); data/util-linux-2.36.1/term-utils/script.c:544:8: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. rc = vsnprintf(msg, sizeof(msg), msgfmt, ap); data/util-linux-2.36.1/term-utils/script.c:582:8: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. rc = vsnprintf(msg, sizeof(msg), msgfmt, ap); data/util-linux-2.36.1/term-utils/script.c:974:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(shell, X_OK) == 0) { data/util-linux-2.36.1/term-utils/script.c:976:5: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(shell, shname, "-c", command, (char *)NULL); data/util-linux-2.36.1/term-utils/script.c:978:5: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(shell, shname, "-i", (char *)NULL); data/util-linux-2.36.1/term-utils/script.c:981:5: [4] (shell) execlp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execlp(shname, "-c", command, (char *)NULL); data/util-linux-2.36.1/term-utils/script.c:983:5: [4] (shell) execlp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execlp(shname, "-i", (char *)NULL); data/util-linux-2.36.1/term-utils/scriptlive.c:76:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(25)); data/util-linux-2.36.1/term-utils/scriptlive.c:78:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("scriptlive(1)")); data/util-linux-2.36.1/term-utils/scriptlive.c:317:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(shell, X_OK) == 0) { data/util-linux-2.36.1/term-utils/scriptlive.c:319:5: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(shell, shname, "-c", command, (char *)NULL); data/util-linux-2.36.1/term-utils/scriptlive.c:321:5: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(shell, shname, "-i", (char *)NULL); data/util-linux-2.36.1/term-utils/scriptlive.c:324:5: [4] (shell) execlp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execlp(shname, "-c", command, (char *)NULL); data/util-linux-2.36.1/term-utils/scriptlive.c:326:5: [4] (shell) execlp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execlp(shname, "-i", (char *)NULL); data/util-linux-2.36.1/term-utils/scriptreplay.c:70:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(25)); data/util-linux-2.36.1/term-utils/scriptreplay.c:72:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("scriptreplay(1)")); data/util-linux-2.36.1/term-utils/setterm.c:444:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("setterm(1)")); data/util-linux-2.36.1/term-utils/wall.c:98:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(25)); data/util-linux-2.36.1/term-utils/wall.c:99:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("wall(1)")); data/util-linux-2.36.1/term-utils/wall.c:237:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (argc == 1 && access(argv[0], F_OK) == 0) data/util-linux-2.36.1/term-utils/wall.c:309:7: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. rc = vsnprintf(bs->data + bs->used, limit, fmt, ap); data/util-linux-2.36.1/term-utils/wall.c:316:8: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. rc = vsnprintf(bs->data + bs->used, limit, fmt, ap); data/util-linux-2.36.1/term-utils/wall.c:357:16: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. if (!(whom = getlogin()) || !*whom) data/util-linux-2.36.1/term-utils/write.c:94:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/term-utils/write.c:95:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("write(1)")); data/util-linux-2.36.1/term-utils/write.c:175:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "/dev/%s", u->ut_line); data/util-linux-2.36.1/term-utils/write.c:258:15: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. if ((login = getlogin()) == NULL) data/util-linux-2.36.1/text-utils/col.c:154:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("col(1)")); data/util-linux-2.36.1/text-utils/colcrt.c:92:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(25)); data/util-linux-2.36.1/text-utils/colcrt.c:94:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("colcrt(1)")); data/util-linux-2.36.1/text-utils/colrm.c:68:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/text-utils/colrm.c:71:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("colrm(1)")); data/util-linux-2.36.1/text-utils/column.c:659:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(34)); data/util-linux-2.36.1/text-utils/column.c:660:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("column(1)")); data/util-linux-2.36.1/text-utils/hexdump-conv.c:77:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, *p); data/util-linux-2.36.1/text-utils/hexdump-conv.c:82:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, str); data/util-linux-2.36.1/text-utils/hexdump-conv.c:100:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, list[*p]); data/util-linux-2.36.1/text-utils/hexdump-conv.c:103:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, "del"); data/util-linux-2.36.1/text-utils/hexdump-conv.c:106:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, *p); data/util-linux-2.36.1/text-utils/hexdump-conv.c:109:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, *p); data/util-linux-2.36.1/text-utils/hexdump-display.c:119:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, address); data/util-linux-2.36.1/text-utils/hexdump-display.c:122:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, ""); data/util-linux-2.36.1/text-utils/hexdump-display.c:128:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, *bp); data/util-linux-2.36.1/text-utils/hexdump-display.c:137:4: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, fval); data/util-linux-2.36.1/text-utils/hexdump-display.c:141:4: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, dval); data/util-linux-2.36.1/text-utils/hexdump-display.c:154:4: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, (unsigned long long) *bp); data/util-linux-2.36.1/text-utils/hexdump-display.c:158:4: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, (unsigned long long) sval); data/util-linux-2.36.1/text-utils/hexdump-display.c:162:4: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, (unsigned long long) ival); data/util-linux-2.36.1/text-utils/hexdump-display.c:166:4: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, Lval); data/util-linux-2.36.1/text-utils/hexdump-display.c:172:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, isprint(*bp) ? *bp : '.'); data/util-linux-2.36.1/text-utils/hexdump-display.c:175:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, (char *)bp); data/util-linux-2.36.1/text-utils/hexdump-display.c:191:4: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, (unsigned long long) *bp); data/util-linux-2.36.1/text-utils/hexdump-display.c:195:4: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, (unsigned long long) sval); data/util-linux-2.36.1/text-utils/hexdump-display.c:199:4: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, (unsigned long long) ival); data/util-linux-2.36.1/text-utils/hexdump-display.c:203:4: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, Lval); data/util-linux-2.36.1/text-utils/hexdump-display.c:311:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(pr->fmt, eaddress); data/util-linux-2.36.1/text-utils/hexdump-parse.c:427:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pr->fmt, fmtp); data/util-linux-2.36.1/text-utils/hexdump-parse.c:428:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pr->fmt, cs); data/util-linux-2.36.1/text-utils/hexdump.c:184:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(27)); data/util-linux-2.36.1/text-utils/hexdump.c:187:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_ARG_SIZE(_("<length> and <offset>"))); data/util-linux-2.36.1/text-utils/hexdump.c:189:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("hexdump(1)")); data/util-linux-2.36.1/text-utils/line.c:37:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/text-utils/line.c:38:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("line(1)")); data/util-linux-2.36.1/text-utils/more.c:252:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(23)); data/util-linux-2.36.1/text-utils/more.c:253:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("more(1)")); data/util-linux-2.36.1/text-utils/more.c:1133:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(outstr, ctl->file_names[ctl->argv_position]); data/util-linux-2.36.1/text-utils/more.c:1140:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(outstr, ctl->shell_line); data/util-linux-2.36.1/text-utils/more.c:1259:3: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(cmd, args); data/util-linux-2.36.1/text-utils/more.c:1558:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(P_("...back %d page", "...back %d pages", nlines), nlines); data/util-linux-2.36.1/text-utils/more.c:1582:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(P_("...skipping %d line", data/util-linux-2.36.1/text-utils/pg.c:250:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/text-utils/pg.c:252:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("pg(1)")); data/util-linux-2.36.1/text-utils/pg.c:587:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, cmdstr); data/util-linux-2.36.1/text-utils/pg.c:625:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(b, pstring); data/util-linux-2.36.1/text-utils/pg.c:627:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(b, p + 2); data/util-linux-2.36.1/text-utils/pg.c:1384:7: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(sh, sh, "-c", data/util-linux-2.36.1/text-utils/rev.c:82:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(16)); data/util-linux-2.36.1/text-utils/rev.c:83:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("rev(1)")); data/util-linux-2.36.1/text-utils/ul.c:151:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_HELP_OPTIONS(30)); data/util-linux-2.36.1/text-utils/ul.c:153:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(USAGE_MAN_TAIL("ul(1)")); data/util-linux-2.36.1/Documentation/boilerplate.c:89:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "nr:zelfVh", longopts, NULL)) != -1) data/util-linux-2.36.1/disk-utils/addpart.c:41:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1) data/util-linux-2.36.1/disk-utils/cfdisk.c:2701:13: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((c = getopt_long(argc, argv, "L::hVz", longopts, NULL)) != -1) { data/util-linux-2.36.1/disk-utils/delpart.c:41:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1) data/util-linux-2.36.1/disk-utils/fdformat.c:192:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt_long(argc, argv, "f:t:r:nVh", longopts, NULL)) != -1) data/util-linux-2.36.1/disk-utils/fdisk.c:955:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "b:Bc::C:hH:lL::no:sS:t:u::vVw:W:x", data/util-linux-2.36.1/disk-utils/fsck.c:493:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. path = getenv("FSTAB_FILE"); data/util-linux-2.36.1/disk-utils/fsck.c:753:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. while (inst->next && (random() & 1)) { data/util-linux-2.36.1/disk-utils/fsck.c:875:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (noexecute && (flags & WNOHANG) && !(random() % 3)) data/util-linux-2.36.1/disk-utils/fsck.c:1600:6: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("FSCK_FORCE_ALL_PARALLEL")) data/util-linux-2.36.1/disk-utils/fsck.c:1602:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((tmp = getenv("FSCK_MAX_INST"))) data/util-linux-2.36.1/disk-utils/fsck.c:1611:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *path = getenv("PATH"); data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:670:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "ayvVhb:", longopts, NULL)) != EOF) data/util-linux-2.36.1/disk-utils/fsck.minix.c:1299:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((i = getopt_long(argc, argv, "larvsmfVh", longopts, NULL)) != -1) data/util-linux-2.36.1/disk-utils/isosize.c:133:16: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt = getopt_long(argc, argv, "d:xVh", longopts, NULL)) != -1) { data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:136:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "N:V:F:vhcl", longopts, NULL)) != -1) { data/util-linux-2.36.1/disk-utils/mkfs.c:91:18: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. && ((i = getopt_long(argc, argv, "Vt:h", longopts, NULL)) data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:731:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt(argc, argv, "hb:Ee:i:n:N:psVvz")) != EOF) { data/util-linux-2.36.1/disk-utils/mkfs.minix.c:156:20: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *str = getenv("MKFS_MINIX_TEST_SECOND_SINCE_EPOCH"); data/util-linux-2.36.1/disk-utils/mkfs.minix.c:765:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((i = getopt_long(argc, argv, "1v23n:i:cl:Vh", longopts, NULL)) != -1) data/util-linux-2.36.1/disk-utils/mkswap.c:385:13: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((c = getopt_long(argc, argv, "cfp:L:v:U:Vh", longopts, NULL)) != -1) { data/util-linux-2.36.1/disk-utils/partx.c:838:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, data/util-linux-2.36.1/disk-utils/raw.c:113:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "qaVh", longopts, NULL)) != -1) data/util-linux-2.36.1/disk-utils/resizepart.c:85:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1) data/util-linux-2.36.1/disk-utils/sfdisk.c:334:22: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *home = getenv ("HOME"); data/util-linux-2.36.1/disk-utils/sfdisk.c:2186:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "aAbcdfFgGhJlLo:O:nN:qrsTu:vVX:Y:w:W:", data/util-linux-2.36.1/disk-utils/swaplabel.c:157:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "hVL:U:", longopts, NULL)) != -1) { data/util-linux-2.36.1/include/debug.h:106:38: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *envstr = mask ? NULL : getenv(# env); \ data/util-linux-2.36.1/include/randutils.h:5:9: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define srand(x) srandom(x) data/util-linux-2.36.1/include/randutils.h:5:18: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define srand(x) srandom(x) data/util-linux-2.36.1/include/randutils.h:6:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define rand() random() data/util-linux-2.36.1/lib/blkdev.c:371:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. lockmode = getenv("LOCK_BLOCK_DEVICE"); data/util-linux-2.36.1/lib/canonicalize.c:128:14: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. canonical = realpath(path, NULL); data/util-linux-2.36.1/lib/canonicalize.c:179:16: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. canonical = realpath(path, NULL); data/util-linux-2.36.1/lib/colors.c:338:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *p = getenv("XDG_CONFIG_HOME"); data/util-linux-2.36.1/lib/colors.c:345:6: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. p = getenv("HOME"); data/util-linux-2.36.1/lib/colors.c:577:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. cc->termname = getenv("TERM"); data/util-linux-2.36.1/lib/colors.c:867:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "C:c:m:n:", longopts, NULL)) != -1) { data/util-linux-2.36.1/lib/cpuset.c:355:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "n:m:r:", longopts, NULL)) != -1) { data/util-linux-2.36.1/lib/env.c:107:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. return getenv(arg); data/util-linux-2.36.1/lib/env.c:132:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. p = getenv(copy); data/util-linux-2.36.1/lib/exec_shell.c:35:22: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *shell = getenv("SHELL"); data/util-linux-2.36.1/lib/fileutils.c:58:23: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. tmpenv = dir ? dir : getenv("TMPDIR"); data/util-linux-2.36.1/lib/pager.c:188:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. path = getenv("PATH"); data/util-linux-2.36.1/lib/pager.c:212:22: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *pager = getenv("PAGER"); data/util-linux-2.36.1/lib/path.c:1083:13: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((c = getopt_long(argc, argv, "p:h", longopts, NULL)) != -1) { data/util-linux-2.36.1/lib/pty-session.c:656:10: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. shell = getenv("SHELL"); data/util-linux-2.36.1/lib/randutils.c:68:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((n_pid << 16) ^ n_uid ^ tv.tv_sec ^ tv.tv_usec); data/util-linux-2.36.1/lib/randutils.c:175:14: [3] (random) jrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *cp++ ^= (jrand48(tmp_seed) >> 7) & 0xFF; data/util-linux-2.36.1/lib/timeutils.c:556:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *zone = getenv("TZ"); data/util-linux-2.36.1/lib/ttyutils.c:16:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *cp = getenv(name); data/util-linux-2.36.1/lib/ttyutils.c:127:10: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. *type = getenv("TERM"); data/util-linux-2.36.1/libblkid/src/dev.c:234:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt (argc, argv, "m:f:")) != EOF) data/util-linux-2.36.1/libblkid/src/tag.c:408:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt (argc, argv, "m:f:")) != EOF) data/util-linux-2.36.1/libfdisk/samples/mkpart-fullspec.c:73:13: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((c = getopt_long(argc, argv, "x:d:h", longopts, NULL)) != -1) { data/util-linux-2.36.1/libfdisk/samples/mkpart.c:88:13: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((c = getopt_long(argc, argv, "g:x:d:h", longopts, NULL)) != -1) { data/util-linux-2.36.1/libmount/python/pylibmount.c:221:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *str = getenv("PYLIBMOUNT_DEBUG"); data/util-linux-2.36.1/libmount/src/utils.c:1031:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. path = getenv("LIBMOUNT_KERNEL_CMDLINE"); data/util-linux-2.36.1/libsmartcols/samples/fromfile.c:260:13: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((c = getopt_long(argc, argv, "hCc:Ei:JMmn:p:rw:", longopts, NULL)) != -1) { data/util-linux-2.36.1/libsmartcols/samples/grouping-overlay.c:79:13: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((c = getopt_long(argc, argv, "hmw:", longopts, NULL)) != -1) { data/util-linux-2.36.1/libsmartcols/samples/grouping-simple.c:79:13: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((c = getopt_long(argc, argv, "hmw:", longopts, NULL)) != -1) { data/util-linux-2.36.1/libsmartcols/samples/title.c:78:13: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((c = getopt_long(argc, argv, "hmw:", longopts, NULL)) != -1) { data/util-linux-2.36.1/libsmartcols/samples/tree.c:185:13: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((c = getopt_long(argc, argv, "ciJlnprS:E:", longopts, NULL)) != -1) { data/util-linux-2.36.1/libsmartcols/src/table.c:55:8: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. str = getenv("LIBSMARTCOLS_DEBUG_PADDING"); data/util-linux-2.36.1/login-utils/chfn.c:151:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "f:r:p:h:o:uv", long_options, data/util-linux-2.36.1/login-utils/chsh.c:167:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "s:lhuv", long_options, NULL)) != -1) { data/util-linux-2.36.1/login-utils/last.c:958:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, data/util-linux-2.36.1/login-utils/login.c:1085:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. termenv = getenv("TERM"); data/util-linux-2.36.1/login-utils/login.c:1243:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "fHh:pV", longopts, NULL)) != -1) data/util-linux-2.36.1/login-utils/login.c:1389:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. mail = getenv("MAIL"); data/util-linux-2.36.1/login-utils/lslogins.c:1491:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "acefGg:hLl:no:prsuVzZ", data/util-linux-2.36.1/login-utils/newgrp.c:201:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1) data/util-linux-2.36.1/login-utils/nologin.c:70:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "c:ilrhV", longopts, NULL)) != -1) { data/util-linux-2.36.1/login-utils/su-common.c:625:20: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *env = getenv(name); data/util-linux-2.36.1/login-utils/su-common.c:1012:3: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. getopt_long(argc, argv, "c:fg:G:lmpPs:u:hVw:", longopts, data/util-linux-2.36.1/login-utils/su-common.c:1156:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. shell = getenv("SHELL"); data/util-linux-2.36.1/login-utils/sulogin-consoles.c:253:13: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. name = realpath(path, NULL); data/util-linux-2.36.1/login-utils/sulogin-consoles.c:277:10: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. name = realpath(path, NULL); data/util-linux-2.36.1/login-utils/sulogin-consoles.c:296:10: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. name = realpath(path, NULL); data/util-linux-2.36.1/login-utils/sulogin-consoles.c:627:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. consoles_debug = getenv("CONSOLES_DEBUG") ? 1 : 0; data/util-linux-2.36.1/login-utils/sulogin.c:738:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((p = getenv("SUSHELL")) != NULL) data/util-linux-2.36.1/login-utils/sulogin.c:740:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if ((p = getenv("sushell")) != NULL) data/util-linux-2.36.1/login-utils/sulogin.c:864:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "ehpt:V", longopts, NULL)) != -1) { data/util-linux-2.36.1/login-utils/sulogin.c:904:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. tty = getenv("CONSOLE"); data/util-linux-2.36.1/login-utils/utmpdump.c:341:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "fro:hV", longopts, NULL)) != -1) { data/util-linux-2.36.1/login-utils/vipw.c:197:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. editor = getenv("EDITOR"); data/util-linux-2.36.1/login-utils/vipw.c:338:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1) { data/util-linux-2.36.1/misc-utils/blkid.c:707:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long (argc, argv, data/util-linux-2.36.1/misc-utils/cal.c:273:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *str = getenv("CAL_TEST_TIME"); data/util-linux-2.36.1/misc-utils/cal.c:344:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. term = getenv("TERM"); data/util-linux-2.36.1/misc-utils/cal.c:388:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt_long(argc, argv, "13mjn:sSywYvVh", longopts, NULL)) != -1) { data/util-linux-2.36.1/misc-utils/fincore.c:311:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long (argc, argv, "bno:JrVh", longopts, NULL)) != -1) { data/util-linux-2.36.1/misc-utils/findfs.c:62:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1) data/util-linux-2.36.1/misc-utils/findmnt.c:394:9: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. path = realpath(devname, NULL); data/util-linux-2.36.1/misc-utils/findmnt.c:1366:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, data/util-linux-2.36.1/misc-utils/getopt.c:384:6: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("GETOPT_COMPATIBLE")) data/util-linux-2.36.1/misc-utils/getopt.c:400:19: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. getopt_long_fp = getopt_long; data/util-linux-2.36.1/misc-utils/getopt.c:411:3: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. getopt_long(argc, argv, shortopts, longopts, NULL)) != EOF) data/util-linux-2.36.1/misc-utils/hardlink.c:418:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt_long(argc, argv, "cnvfx:Vh", longopts, NULL)) != -1) { data/util-linux-2.36.1/misc-utils/logger.c:152:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *str = getenv("LOGGER_TEST_TIMEOFDAY"); data/util-linux-2.36.1/misc-utils/logger.c:166:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *str = getenv("LOGGER_TEST_HOSTNAME"); data/util-linux-2.36.1/misc-utils/logger.c:172:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *str = getenv("LOGGER_TEST_GETPID"); data/util-linux-2.36.1/misc-utils/logger.c:1165:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt_long(argc, argv, "ef:ip:S:st:u:dTn:P:Vh", data/util-linux-2.36.1/misc-utils/look.c:107:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((file = getenv("WORDLIST")) && !access(file, R_OK)) data/util-linux-2.36.1/misc-utils/look.c:115:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt_long(argc, argv, "adft:Vh", longopts, NULL)) != -1) data/util-linux-2.36.1/misc-utils/lsblk.c:1888:13: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((c = getopt_long(argc, argv, data/util-linux-2.36.1/misc-utils/lslocks.c:590:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, data/util-linux-2.36.1/misc-utils/mcookie.c:156:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "f:m:vVh", longopts, NULL)) != -1) { data/util-linux-2.36.1/misc-utils/namei.c:377:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "hVlmnovx", longopts, NULL)) != -1) { data/util-linux-2.36.1/misc-utils/rename.c:257:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "vsVhnoi", longopts, NULL)) != -1) data/util-linux-2.36.1/misc-utils/test_uuidd.c:274:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while (((c = getopt(argc, argv, "p:t:o:l:h")) != -1)) { data/util-linux-2.36.1/misc-utils/uuidd.c:581:3: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. getopt_long(argc, argv, "p:s:T:krtn:PFSdqVh", longopts, data/util-linux-2.36.1/misc-utils/uuidgen.c:109:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "rtVhn:N:msx", longopts, NULL)) != -1) data/util-linux-2.36.1/misc-utils/uuidparse.c:309:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "Jno:rVh", longopts, NULL)) != -1) { data/util-linux-2.36.1/misc-utils/whereis.c:312:50: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *key = NULL, *tok = NULL, *pathcp, *path = getenv(env); data/util-linux-2.36.1/misc-utils/wipefs.c:557:22: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *home = getenv ("HOME"); data/util-linux-2.36.1/misc-utils/wipefs.c:720:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "abfhiJnO:o:pqt:V", longopts, NULL)) != -1) { data/util-linux-2.36.1/schedutils/chrt.c:449:13: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((c = getopt_long(argc, argv, "+abdD:fiphmoP:T:rRvV", longopts, NULL)) != -1) data/util-linux-2.36.1/schedutils/ionice.c:154:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "+n:c:p:P:u:tVh", longopts, NULL)) != EOF) data/util-linux-2.36.1/schedutils/taskset.c:164:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "+apchV", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/blkdiscard.c:177:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "hfVsvo:l:p:z", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/blkzone.c:422:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "hc:l:o:fvV", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/chcpu.c:311:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "c:d:e:g:hp:rV", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/chmem.c:391:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "bdehvVz:", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/choom.c:99:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "hn:p:V", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/ctrlaltdel.c:98:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1) data/util-linux-2.36.1/sys-utils/dmesg.c:1294:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *str = getenv("DMESG_TEST_BOOTIME"); data/util-linux-2.36.1/sys-utils/dmesg.c:1308:6: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("DMESG_TEST_BOOTIME")) data/util-linux-2.36.1/sys-utils/dmesg.c:1390:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "CcDdEeF:f:HhkL::l:n:iPprSs:TtuVWwx", data/util-linux-2.36.1/sys-utils/eject.c:203:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, data/util-linux-2.36.1/sys-utils/fallocate.c:326:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "hvVncpdizxl:o:", longopts, NULL)) data/util-linux-2.36.1/sys-utils/flock.c:185:3: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. getopt_long(argc, argv, "+sexnoFuw:E:hV?", long_options, data/util-linux-2.36.1/sys-utils/flock.c:244:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. cmd_argv[0] = getenv("SHELL"); data/util-linux-2.36.1/sys-utils/fsfreeze.c:82:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "hfuV", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/fstrim.c:91:16: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. char *rpath = realpath(path, NULL); data/util-linux-2.36.1/sys-utils/fstrim.c:478:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "AahI:l:m:no:Vv", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:2992:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *tz = getenv ("TZ"); data/util-linux-2.36.1/sys-utils/hwclock.c:145:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. int usec = random() % 1000000; data/util-linux-2.36.1/sys-utils/hwclock.c:1304:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, data/util-linux-2.36.1/sys-utils/ipcmk.c:111:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((opt = getopt_long(argc, argv, "hM:QS:p:Vh", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/ipcrm.c:339:13: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((c = getopt_long(argc, argv, "q:m:s:Q:M:S:a::vhV", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/ipcs.c:120:16: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt = getopt_long(argc, argv, options, longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/irqtop.c:259:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((o = getopt_long(argc, argv, "d:o:s:hV", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/ldattach.c:323:3: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. getopt_long(argc, argv, "dhV78neo12s:i:c:p:", opttbl, data/util-linux-2.36.1/sys-utils/losetup.c:654:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "ab:c:d:Dfhj:JlLno:O:PrvV", data/util-linux-2.36.1/sys-utils/lscpu.c:2335:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "aBbC::ce::hJp::s:xyV", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/lsipc.c:1146:16: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt = getopt_long(argc, argv, "bceghi:Jlmno:PqrstV", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/lsirq.c:103:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "no:s:hJPV", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/lsmem.c:580:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "abhJno:PrS:s:V", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/lsns.c:973:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, data/util-linux-2.36.1/sys-utils/mount.c:670:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "aBcfFhilL:Mno:O:rRsU:vVwt:T:N:", data/util-linux-2.36.1/sys-utils/mountpoint.c:163:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "qdxhV", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/nsenter.c:254:3: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. getopt_long(argc, argv, "+ahVt:m::u::i::n::p::C::U::T::S:G:r::w::FZ", data/util-linux-2.36.1/sys-utils/nsenter.c:458:7: [3] (misc) chroot: chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22). Make sure the program immediately chdir("/"), closes file descriptors, and drops root privileges, and that all necessary files (and no more!) are in the new root. if (chroot(".") < 0) data/util-linux-2.36.1/sys-utils/pivot_root.c:60:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1) data/util-linux-2.36.1/sys-utils/prlimit.c:531:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((opt = getopt_long(argc, argv, data/util-linux-2.36.1/sys-utils/readprofile.c:177:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "m:p:M:ivabsrnVh", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/rfkill.c:642:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "Jno:rVh", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/rtcwake.c:470:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((t = getopt_long(argc, argv, "A:ahd:lm:ns:t:uVv", data/util-linux-2.36.1/sys-utils/setarch.c:365:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "+hVv3BFILRSTXZ", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/setpriv.c:663:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *term = getenv("TERM"); data/util-linux-2.36.1/sys-utils/setpriv.c:815:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "+dhV", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/setsid.c:71:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt_long(argc, argv, "+Vhcfw", longopts, NULL)) != -1) data/util-linux-2.36.1/sys-utils/swapoff.c:231:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "ahvVL:U:", data/util-linux-2.36.1/sys-utils/swapon.c:893:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "ahd::efo:p:svVL:U:", data/util-linux-2.36.1/sys-utils/switch_root.c:177:6: [3] (misc) chroot: chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22). Make sure the program immediately chdir("/"), closes file descriptors, and drops root privileges, and that all necessary files (and no more!) are in the new root. if (chroot(".")) { data/util-linux-2.36.1/sys-utils/switch_root.c:230:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "+Vh", longopts, NULL)) != -1) data/util-linux-2.36.1/sys-utils/tunelp.c:160:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "t:c:w:a:i:ho:C:sq:rT:vV", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/umount.c:502:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "aAcdfhilnqRrO:t:vVN:", data/util-linux-2.36.1/sys-utils/unshare.c:422:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "+fhVmuinpCTUrR:w:S:G:c", longopts, NULL)) != -1) { data/util-linux-2.36.1/sys-utils/unshare.c:644:7: [3] (misc) chroot: chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22). Make sure the program immediately chdir("/"), closes file descriptors, and drops root privileges, and that all necessary files (and no more!) are in the new root. if (chroot(newroot) != 0) data/util-linux-2.36.1/sys-utils/wdctl.c:626:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, data/util-linux-2.36.1/sys-utils/zramctl.c:624:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "a:bfho:nrs:t:V", longopts, NULL)) != -1) { data/util-linux-2.36.1/term-utils/agetty.c:186:8: [3] (misc) chroot: chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22). Make sure the program immediately chdir("/"), closes file descriptors, and drops root privileges, and that all necessary files (and no more!) are in the new root. char *chroot; /* Chroot before the login */ data/util-linux-2.36.1/term-utils/agetty.c:548:14: [3] (misc) chroot: chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22). Make sure the program immediately chdir("/"), closes file descriptors, and drops root privileges, and that all necessary files (and no more!) are in the new root. if (options.chroot && chroot(options.chroot) < 0) data/util-linux-2.36.1/term-utils/agetty.c:548:24: [3] (misc) chroot: chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22). Make sure the program immediately chdir("/"), closes file descriptors, and drops root privileges, and that all necessary files (and no more!) are in the new root. if (options.chroot && chroot(options.chroot) < 0) data/util-linux-2.36.1/term-utils/agetty.c:548:39: [3] (misc) chroot: chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22). Make sure the program immediately chdir("/"), closes file descriptors, and drops root privileges, and that all necessary files (and no more!) are in the new root. if (options.chroot && chroot(options.chroot) < 0) data/util-linux-2.36.1/term-utils/agetty.c:550:25: [3] (misc) chroot: chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22). Make sure the program immediately chdir("/"), closes file descriptors, and drops root privileges, and that all necessary files (and no more!) are in the new root. options.tty, options.chroot); data/util-linux-2.36.1/term-utils/agetty.c:757:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, data/util-linux-2.36.1/term-utils/mesg.c:110:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt_long(argc, argv, "vVh", longopts, NULL)) != -1) data/util-linux-2.36.1/term-utils/script.c:173:20: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *str = getenv("SCRIPT_TEST_SECOND_SINCE_EPOCH"); data/util-linux-2.36.1/term-utils/script.c:808:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt_long(argc, argv, "aB:c:eE:fI:O:o:qm:T:t::Vh", longopts, NULL)) != -1) { data/util-linux-2.36.1/term-utils/script.c:915:10: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. shell = getenv("SHELL"); data/util-linux-2.36.1/term-utils/scriptlive.c:203:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt_long(argc, argv, "c:B:I:T:t:d:m:Vh", longopts, NULL)) != -1) { data/util-linux-2.36.1/term-utils/scriptlive.c:273:10: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. shell = getenv("SHELL"); data/util-linux-2.36.1/term-utils/scriptreplay.c:178:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt_long(argc, argv, "B:c:I:O:T:t:s:d:m:x:Vh", longopts, NULL)) != -1) { data/util-linux-2.36.1/term-utils/setterm.c:1165:31: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. ctl->opt_te_terminal_name = getenv("TERM"); data/util-linux-2.36.1/term-utils/wall.c:209:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt_long(argc, argv, "nt:g:Vh", longopts, NULL)) != -1) { data/util-linux-2.36.1/term-utils/write.c:313:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1) data/util-linux-2.36.1/tests/helpers/test_sigreceive.c:65:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "s:h", longopts, NULL)) != -1) data/util-linux-2.36.1/text-utils/col.c:199:16: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt = getopt_long(argc, argv, "bfhl:pxVH", longopts, NULL)) != -1) data/util-linux-2.36.1/text-utils/colcrt.c:257:16: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt = getopt_long(argc, argv, "2Vh", longopts, NULL)) != -1) { data/util-linux-2.36.1/text-utils/colrm.c:172:3: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. getopt_long(argc, argv, "bfhl:pxVH", longopts, data/util-linux-2.36.1/text-utils/column.c:718:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "c:dE:eH:hi:JLN:n:O:o:p:R:r:s:T:tVW:x", longopts, NULL)) != -1) { data/util-linux-2.36.1/text-utils/hexdump.c:92:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt_long(argc, argv, "bcCde:f:L::n:os:vxhV", longopts, NULL)) != -1) { data/util-linux-2.36.1/text-utils/line.c:59:16: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1) data/util-linux-2.36.1/text-utils/more.c:301:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(as_argc, as_argv, "dflcpsun:eVh", longopts, NULL)) != -1) { data/util-linux-2.36.1/text-utils/more.c:1476:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. editor = getenv("VISUAL"); data/util-linux-2.36.1/text-utils/more.c:1478:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. editor = getenv("EDITOR"); data/util-linux-2.36.1/text-utils/more.c:1943:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((term = getenv("TERM")) == NULL) { data/util-linux-2.36.1/text-utils/more.c:1996:20: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((ctl->shell = getenv("SHELL")) == NULL) data/util-linux-2.36.1/text-utils/more.c:2026:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((s = getenv("MORE")) != NULL) data/util-linux-2.36.1/text-utils/pg.c:323:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((p = getenv("LINES")) != NULL && *p != '\0') data/util-linux-2.36.1/text-utils/pg.c:326:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((p = getenv("COLUMNS")) != NULL && *p != '\0') data/util-linux-2.36.1/text-utils/pg.c:1369:24: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *sh = getenv("SHELL"); data/util-linux-2.36.1/text-utils/rev.c:122:15: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1) data/util-linux-2.36.1/text-utils/ul.c:180:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. termtype = getenv("TERM"); data/util-linux-2.36.1/text-utils/ul.c:182:14: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt_long(argc, argv, "it:T:Vh", longopts, NULL)) != -1) data/util-linux-2.36.1/disk-utils/addpart.c:56:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(argv[1], O_RDONLY)) < 0) data/util-linux-2.36.1/disk-utils/blockdev.c:291:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(argv[k], O_RDONLY, 0); data/util-linux-2.36.1/disk-utils/blockdev.c:354:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). iarg = atoi(argv[++i]); data/util-linux-2.36.1/disk-utils/blockdev.c:430:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[200]; data/util-linux-2.36.1/disk-utils/blockdev.c:431:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ptname[200 + 1]; data/util-linux-2.36.1/disk-utils/blockdev.c:432:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char device[210]; data/util-linux-2.36.1/disk-utils/blockdev.c:435:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). procpt = fopen(_PATH_PROC_PARTITIONS, "r"); data/util-linux-2.36.1/disk-utils/blockdev.c:458:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char start_str[11] = { "\0" }; data/util-linux-2.36.1/disk-utils/blockdev.c:461:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(device, O_RDONLY | O_NONBLOCK); data/util-linux-2.36.1/disk-utils/blockdev.c:486:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(start_str, "%10ju", start); data/util-linux-2.36.1/disk-utils/cfdisk.c:837:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ignore[128] = { 0 }; data/util-linux-2.36.1/disk-utils/cfdisk.c:1353:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(data)) data/util-linux-2.36.1/disk-utils/cfdisk.c:1359:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(data)) data/util-linux-2.36.1/disk-utils/cfdisk.c:1365:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(data)) data/util-linux-2.36.1/disk-utils/cfdisk.c:1877:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/util-linux-2.36.1/disk-utils/cfdisk.c:2029:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. free((char *) cm[i].name); data/util-linux-2.36.1/disk-utils/cfdisk.c:2040:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX] = { 0 }; data/util-linux-2.36.1/disk-utils/cfdisk.c:2070:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX] = { 0 }; data/util-linux-2.36.1/disk-utils/cfdisk.c:2094:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(buf, "w"); data/util-linux-2.36.1/disk-utils/cfdisk.c:2450:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64] = { 0 }; data/util-linux-2.36.1/disk-utils/cramfs_common.c:49:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char inode_out_buf[sizeof(*inode_in)]; data/util-linux-2.36.1/disk-utils/delpart.c:57:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(argv[1], O_RDONLY)) < 0) data/util-linux-2.36.1/disk-utils/fdisk-list.c:29:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(device, O_RDONLY)) < 0) data/util-linux-2.36.1/disk-utils/fdisk-list.c:322:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[128 + 1]; data/util-linux-2.36.1/disk-utils/fdisk-list.c:325:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). *f = fopen(_PATH_PROC_PARTITIONS, "r"); data/util-linux-2.36.1/disk-utils/fdisk-list.c:333:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX], *cn; data/util-linux-2.36.1/disk-utils/fdisk-list.c:472:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[namesz + 1]; data/util-linux-2.36.1/disk-utils/fdisk-list.c:478:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, name, namesz); data/util-linux-2.36.1/disk-utils/fdisk-list.c:529:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fields_ids, dflt_ids, fields_nids * sizeof(int)); data/util-linux-2.36.1/disk-utils/fdisk-menu.c:421:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ] = { '\0' }; data/util-linux-2.36.1/disk-utils/fdisk-menu.c:523:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "w"); data/util-linux-2.36.1/disk-utils/fdisk.c:145:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, reply_line, min(sz, bufsz)); data/util-linux-2.36.1/disk-utils/fdisk.c:196:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prompt[128]; data/util-linux-2.36.1/disk-utils/fdisk.c:236:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prompt[128] = { '\0' }; data/util-linux-2.36.1/disk-utils/fdisk.c:308:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prompt[128] = { '\0' }; data/util-linux-2.36.1/disk-utils/fdisk.c:402:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ] = { '\0' }; data/util-linux-2.36.1/disk-utils/fdisk.c:455:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prmt[BUFSIZ]; data/util-linux-2.36.1/disk-utils/fdisk.c:493:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256] = { '\0' }; data/util-linux-2.36.1/disk-utils/fdisk.c:548:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[NAME_WIDTH * MB_LEN_MAX]; data/util-linux-2.36.1/disk-utils/fdisk.c:811:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(dev, O_RDONLY)) < 0) data/util-linux-2.36.1/disk-utils/fsck.c:130:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *devices[MAX_DEVICES]; data/util-linux-2.36.1/disk-utils/fsck.c:131:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *args[MAX_ARGS]; data/util-linux-2.36.1/disk-utils/fsck.c:310:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX]; data/util-linux-2.36.1/disk-utils/fsck.c:322:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(path, "r"); data/util-linux-2.36.1/disk-utils/fsck.c:373:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). inst->lock = open(inst->lockpath, O_RDONLY|O_CREAT|O_CLOEXEC, data/util-linux-2.36.1/disk-utils/fsck.c:630:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[80]; data/util-linux-2.36.1/disk-utils/fsck.c:649:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[80]; data/util-linux-2.36.1/disk-utils/fsck.c:815:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&inst->rusage, &rusage, sizeof(struct rusage)); data/util-linux-2.36.1/disk-utils/fsck.c:1177:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirname[PATH_MAX]; data/util-linux-2.36.1/disk-utils/fsck.c:1425:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char options[128]; data/util-linux-2.36.1/disk-utils/fsck.c:1603:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). max_running = atoi(tmp); data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:93:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char read_buffer[ROMBUFFERSIZE * 2]; data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:153:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, O_RDONLY); data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:282:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[10]; data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:456:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newpath, path, pathlen); data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:477:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newpath + pathlen, romfs_read(offset), newlen); data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:512:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). outfd = open(path, O_WRONLY | O_CREAT | O_TRUNC, i->mode); data/util-linux-2.36.1/disk-utils/fsck.minix.c:133:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name_list[MAX_DEPTH][MINIX_NAME_MAX + 1]; data/util-linux-2.36.1/disk-utils/fsck.minix.c:137:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char current_name[MAX_DEPTH * (MINIX_NAME_MAX + 1) + 1]; data/util-linux-2.36.1/disk-utils/fsck.minix.c:237:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input[YESNO_LENGTH]; data/util-linux-2.36.1/disk-utils/fsck.minix.c:536:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char blk[MINIX_BLOCK_SIZE]; data/util-linux-2.36.1/disk-utils/fsck.minix.c:834:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char blk[MINIX_BLOCK_SIZE]; data/util-linux-2.36.1/disk-utils/fsck.minix.c:850:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char blk[MINIX_BLOCK_SIZE]; data/util-linux-2.36.1/disk-utils/fsck.minix.c:866:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char blk[MINIX_BLOCK_SIZE]; data/util-linux-2.36.1/disk-utils/fsck.minix.c:882:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char blk[MINIX_BLOCK_SIZE]; data/util-linux-2.36.1/disk-utils/fsck.minix.c:898:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char blk[MINIX_BLOCK_SIZE]; data/util-linux-2.36.1/disk-utils/fsck.minix.c:951:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char blk[MINIX_BLOCK_SIZE + 2]; data/util-linux-2.36.1/disk-utils/fsck.minix.c:1022:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char blk[MINIX_BLOCK_SIZE + 4]; data/util-linux-2.36.1/disk-utils/fsck.minix.c:1131:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/util-linux-2.36.1/disk-utils/fsck.minix.c:1343:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). device_fd = open(device_name, repair ? O_RDWR : O_RDONLY); data/util-linux-2.36.1/disk-utils/isosize.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[8]; data/util-linux-2.36.1/disk-utils/isosize.c:49:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char volume_space_size[8]; data/util-linux-2.36.1/disk-utils/isosize.c:50:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char logical_block_size[4]; data/util-linux-2.36.1/disk-utils/isosize.c:52:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(filenamep, O_RDONLY)) < 0) { data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:42:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_fsname[6]; data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:43:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_volume[6]; data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_pad[472]; data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:50:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char i_pad1[2]; data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:59:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char i_pad2[16]; data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:67:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d_name[BFS_NAMELEN]; data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:236:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sb.s_fsname, fsname, 6); data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:237:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sb.s_volume, volume, 6); data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:289:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(de.d_name, ".", 1); data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:293:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(de.d_name, "..", 2); data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:101:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char md5sum[UL_MD5LENGTH]; data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:169:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(path, O_RDONLY); data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:298:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(path, name, len); data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:334:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(endpath, dirent->d_name, namelen + 1); data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:480:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(base + offset, entry->name, len); data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:658:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(file, O_RDONLY); data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:662:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(base + offset, buf, image_length); data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:797:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(outfile, O_WRONLY | O_CREAT | O_TRUNC, 0666); data/util-linux-2.36.1/disk-utils/mkfs.minix.c:119:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char root_block[MINIX_BLOCK_SIZE]; data/util-linux-2.36.1/disk-utils/mkfs.minix.c:120:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char boot_block_buffer[512]; data/util-linux-2.36.1/disk-utils/mkfs.minix.c:415:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(tmp + 4, ".."); data/util-linux-2.36.1/disk-utils/mkfs.minix.c:418:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(tmp + 4, ".badblocks"); data/util-linux-2.36.1/disk-utils/mkfs.minix.c:424:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(tmp + 2, ".."); data/util-linux-2.36.1/disk-utils/mkfs.minix.c:427:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(tmp + 2, ".badblocks"); data/util-linux-2.36.1/disk-utils/mkfs.minix.c:614:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[MINIX_BLOCK_SIZE * TEST_BUFFER_BLOCKS]; data/util-linux-2.36.1/disk-utils/mkfs.minix.c:648:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). listfile = fopen(filename,"r"); data/util-linux-2.36.1/disk-utils/mkswap.c:108:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sp + ctl->pagesize - SWAP_SIGNATURE_SZ, SWAP_SIGNATURE, SWAP_SIGNATURE_SZ); data/util-linux-2.36.1/disk-utils/mkswap.c:136:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuid_string[UUID_STR_LEN]; data/util-linux-2.36.1/disk-utils/mkswap.c:218:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(ctl->devname, O_RDONLY); data/util-linux-2.36.1/disk-utils/mkswap.c:294:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024] = { '\0' }; data/util-linux-2.36.1/disk-utils/partx.c:214:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX], *parent, *dirname = NULL; data/util-linux-2.36.1/disk-utils/partx.c:1020:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(wholedisk, O_RDONLY)) == -1) data/util-linux-2.36.1/disk-utils/raw.c:211:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). master_fd = open(_PATH_RAWDEVCTL, O_RDWR, 0); data/util-linux-2.36.1/disk-utils/raw.c:213:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). master_fd = open(_PATH_RAWDEVCTL_OLD, O_RDWR, 0); data/util-linux-2.36.1/disk-utils/resizepart.c:103:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(wholedisk, O_RDONLY)) < 0) data/util-linux-2.36.1/disk-utils/sfdisk.c:200:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ] = { '\0' }; data/util-linux-2.36.1/disk-utils/sfdisk.c:294:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(fname, O_CREAT | O_WRONLY, S_IRUSR | S_IWUSR); data/util-linux-2.36.1/disk-utils/sfdisk.c:495:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(typescript, "w"); data/util-linux-2.36.1/disk-utils/sfdisk.c:806:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(dev, O_RDONLY); data/util-linux-2.36.1/disk-utils/sfdisk.c:1594:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, p, len); data/util-linux-2.36.1/disk-utils/sfdisk.c:1717:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/disk-utils/swaplabel.c:63:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(devname, O_RDWR); data/util-linux-2.36.1/disk-utils/swaplabel.c:90:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newlabel[SWAP_LABEL_LENGTH]; data/util-linux-2.36.1/include/c.h:181:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char prog_inv_sh_nm_buf[256]; data/util-linux-2.36.1/include/loopdev.h:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char device[128]; /* device path (e.g. /dev/loop<N>) */ data/util-linux-2.36.1/include/md5.h:11:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char in[64]; data/util-linux-2.36.1/include/md5.h:16:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void ul_MD5Final(unsigned char digest[UL_MD5LENGTH], struct UL_MD5Context *ctx); data/util-linux-2.36.1/include/path.h:19:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path_buffer[PATH_MAX]; data/util-linux-2.36.1/include/pt-bsd.h:29:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d_typename[16]; /* type name, e.g. "eagle" */ data/util-linux-2.36.1/include/pt-bsd.h:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d_packname[16]; /* pack identifier */ data/util-linux-2.36.1/include/pt-mbr.h:11:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char start_sect[4]; data/util-linux-2.36.1/include/pt-mbr.h:12:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char nr_sects[4]; data/util-linux-2.36.1/include/pt-sgi.h:73:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char boot_file[16]; /* name of boot file */ data/util-linux-2.36.1/include/pt-sgi.h:78:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char name[8]; /* name of volume */ data/util-linux-2.36.1/include/pt-sgi.h:106:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&val, ptr, sizeof(uint32_t)); data/util-linux-2.36.1/include/pt-sun.h:14:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char label_id[128]; /* Informative text string */ data/util-linux-2.36.1/include/pt-sun.h:18:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char volume_id[8];/* volume name */ data/util-linux-2.36.1/include/pt-sun.h:35:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char spare[148]; /* padding */ data/util-linux-2.36.1/include/sha1.h:18:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[64]; data/util-linux-2.36.1/include/sha1.h:21:57: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void ul_SHA1Transform(uint32_t state[5], const unsigned char buffer[64]); data/util-linux-2.36.1/include/sha1.h:24:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void ul_SHA1Final(unsigned char digest[UL_SHA1LENGTH], UL_SHA1_CTX *context); data/util-linux-2.36.1/include/strutils.h:82:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src, bytes); data/util-linux-2.36.1/include/strutils.h:91:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src, n); data/util-linux-2.36.1/include/strutils.h:115:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, newstr, nsz + 1); data/util-linux-2.36.1/include/swapheader.h:13:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bootbits[1024]; /* Space for disklabel etc. */ data/util-linux-2.36.1/include/swapheader.h:17:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char uuid[SWAP_UUID_LENGTH]; data/util-linux-2.36.1/include/swapheader.h:18:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char volume_name[SWAP_LABEL_LENGTH]; data/util-linux-2.36.1/lib/blkdev.c:265:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(name, oflag | O_EXCL); data/util-linux-2.36.1/lib/blkdev.c:267:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(name, oflag); data/util-linux-2.36.1/lib/blkdev.c:433:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(argv[1], O_RDONLY|O_CLOEXEC)) < 0) data/util-linux-2.36.1/lib/canonicalize.c:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[256], name[sizeof(path) - sizeof(_PATH_DEV_MAPPER)], *res = NULL; data/util-linux-2.36.1/lib/canonicalize.c:42:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(f = fopen(path, "r" UL_CLOEXECSTR))) data/util-linux-2.36.1/lib/canonicalize.c:87:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[PATH_MAX], *res, *p; data/util-linux-2.36.1/lib/canonicalize.c:113:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, cwd, csz); data/util-linux-2.36.1/lib/canonicalize.c:116:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, path, psz + 1); data/util-linux-2.36.1/lib/caputils.c:32:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(_PATH_PROC_CAPLASTCAP, "r"); data/util-linux-2.36.1/lib/colors.c:249:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sfile[PATH_MAX] = { '\0' }; data/util-linux-2.36.1/lib/colors.c:575:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *dirname, buf[PATH_MAX]; data/util-linux-2.36.1/lib/colors.c:596:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ], data/util-linux-2.36.1/lib/colors.c:609:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(cc->sfile, "r"); data/util-linux-2.36.1/lib/cpuset.c:358:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ncpus = atoi(optarg); data/util-linux-2.36.1/lib/env.c:115:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char copy[32]; data/util-linux-2.36.1/lib/fileutils.c:25:7: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). fd = mkstemp(template); data/util-linux-2.36.1/lib/idcache.c:61:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t wc[LOGIN_NAME_MAX + 1]; data/util-linux-2.36.1/lib/ismounted.c:165:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(TEST_FILE, O_RDWR|O_CREAT|O_CLOEXEC, 0600); data/util-linux-2.36.1/lib/ismounted.c:258:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024], *cp; data/util-linux-2.36.1/lib/ismounted.c:270:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(f = fopen("/proc/swaps", "r" UL_CLOEXECSTR))) data/util-linux-2.36.1/lib/ismounted.c:350:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(device, O_RDONLY|O_EXCL|O_CLOEXEC); data/util-linux-2.36.1/lib/ismounted.c:377:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char devname[PATH_MAX]; data/util-linux-2.36.1/lib/linux_version.c:43:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int x = atoi(argv[2]), data/util-linux-2.36.1/lib/linux_version.c:44:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). y = atoi(argv[3]), data/util-linux-2.36.1/lib/linux_version.c:45:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). z = atoi(argv[4]); data/util-linux-2.36.1/lib/loopdev.c:167:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lc, &dummy, sizeof(dummy)); data/util-linux-2.36.1/lib/loopdev.c:281:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). lc->fd = open(lc->device, lc->mode | O_CLOEXEC); data/util-linux-2.36.1/lib/loopdev.c:488:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/lib/loopdev.c:493:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). iter->proc = fopen(_PATH_PROC_PARTITIONS, "r" UL_CLOEXECSTR); data/util-linux-2.36.1/lib/loopdev.c:499:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[128 + 1]; data/util-linux-2.36.1/lib/loopdev.c:538:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[NAME_MAX + 18 + 1]; data/util-linux-2.36.1/lib/loopdev.c:601:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/util-linux-2.36.1/lib/loopdev.c:620:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/util-linux-2.36.1/lib/loopdev.c:914:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("/sys/module/loop/parameters/max_part", "r" UL_CLOEXECSTR); data/util-linux-2.36.1/lib/loopdev.c:1290:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((file_fd = open(lc->filename, mode | O_CLOEXEC)) < 0) { data/util-linux-2.36.1/lib/loopdev.c:1292:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). file_fd = open(lc->filename, mode = O_RDONLY); data/util-linux-2.36.1/lib/loopdev.c:1526:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ctl = open(_PATH_DEV_LOOPCTL, O_RDWR|O_CLOEXEC); data/util-linux-2.36.1/lib/loopdev.c:1555:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ctl = open(_PATH_DEV_LOOPCTL, O_RDWR|O_CLOEXEC); data/util-linux-2.36.1/lib/loopdev.c:1559:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/util-linux-2.36.1/lib/mbsalign.c:197:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(r, "\\x%02x", (unsigned char) *p); data/util-linux-2.36.1/lib/mbsalign.c:217:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(r, "\\x%02x", (unsigned char) *p); data/util-linux-2.36.1/lib/mbsalign.c:227:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(r, "\\x%02x", (unsigned char) p[i]); data/util-linux-2.36.1/lib/mbsalign.c:232:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(r, p, len); data/util-linux-2.36.1/lib/mbsalign.c:240:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(r, "\\x%02x", (unsigned char) *p); data/util-linux-2.36.1/lib/mbsalign.c:296:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(r, "\\x%02x", (unsigned char) *p); data/util-linux-2.36.1/lib/mbsalign.c:304:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(r, "\\x%02x", (unsigned char) *p); data/util-linux-2.36.1/lib/mbsalign.c:308:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(r, p, len); data/util-linux-2.36.1/lib/mbsedit.c:158:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in_buf[MB_CUR_MAX]; data/util-linux-2.36.1/lib/mbsedit.c:172:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, in, n); data/util-linux-2.36.1/lib/md5.c:82:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, buf, len); data/util-linux-2.36.1/lib/md5.c:85:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, buf, t); data/util-linux-2.36.1/lib/md5.c:94:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctx->in, buf, 64); data/util-linux-2.36.1/lib/md5.c:103:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctx->in, buf, len); data/util-linux-2.36.1/lib/md5.c:110:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void ul_MD5Final(unsigned char digest[UL_MD5LENGTH], struct UL_MD5Context *ctx) data/util-linux-2.36.1/lib/md5.c:145:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ctx->in[14 * sizeof(uint32_t)], &ctx->bits[0], 4); data/util-linux-2.36.1/lib/md5.c:146:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ctx->in[15 * sizeof(uint32_t)], &ctx->bits[1], 4); data/util-linux-2.36.1/lib/md5.c:150:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(digest, ctx->buf, UL_MD5LENGTH); data/util-linux-2.36.1/lib/pager.c:196:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(s, O_RDONLY|O_CLOEXEC); data/util-linux-2.36.1/lib/path.c:223:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). pc->dir_fd = open(path, O_RDONLY|O_CLOEXEC); data/util-linux-2.36.1/lib/path.c:373:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(path, flags); data/util-linux-2.36.1/lib/path.c:624:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/lib/path.c:879:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[sizeof(stringify_value(LLONG_MAX))]; data/util-linux-2.36.1/lib/path.c:901:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[sizeof(stringify_value(ULLONG_MAX))]; data/util-linux-2.36.1/lib/path.c:967:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX]; data/util-linux-2.36.1/lib/path.c:972:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return fopen(path, mode); data/util-linux-2.36.1/lib/path.c:977:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return fopen(buf, mode); data/util-linux-2.36.1/lib/path.c:985:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[len]; data/util-linux-2.36.1/lib/path.c:1203:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char res[PATH_MAX]; data/util-linux-2.36.1/lib/procutils.c:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX]; data/util-linux-2.36.1/lib/procutils.c:35:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(path, "/proc/%d/task/", pid); data/util-linux-2.36.1/lib/procutils.c:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ], *res = NULL; data/util-linux-2.36.1/lib/procutils.c:104:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(buf, O_RDONLY); data/util-linux-2.36.1/lib/procutils.c:182:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ], *p; data/util-linux-2.36.1/lib/procutils.c:205:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char procname[256]; data/util-linux-2.36.1/lib/procutils.c:276:44: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). proc_processes_filter_by_uid(ps, (uid_t) atol(argv[2])); data/util-linux-2.36.1/lib/pty-session.c:340:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/lib/randutils.c:85:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("/dev/urandom", O_RDONLY | O_CLOEXEC); data/util-linux-2.36.1/lib/randutils.c:87:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("/dev/random", O_RDONLY | O_NONBLOCK | O_CLOEXEC); data/util-linux-2.36.1/lib/randutils.c:215:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). n = argc == 1 ? 16 : atoi(argv[1]); data/util-linux-2.36.1/lib/setproctitle.c:56:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SPT_BUFSIZE]; data/util-linux-2.36.1/lib/sha1.c:41:57: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void ul_SHA1Transform(uint32_t state[5], const unsigned char buffer[64]) data/util-linux-2.36.1/lib/sha1.c:46:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char c[64]; data/util-linux-2.36.1/lib/sha1.c:53:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(block, buffer, 64); data/util-linux-2.36.1/lib/sha1.c:189:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&context->buffer[j], data, (i = 64 - j)); data/util-linux-2.36.1/lib/sha1.c:197:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&context->buffer[j], &data[i], len - i); data/util-linux-2.36.1/lib/sha1.c:202:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void ul_SHA1Final(unsigned char digest[20], UL_SHA1_CTX *context) data/util-linux-2.36.1/lib/sha1.c:206:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char finalcount[8]; data/util-linux-2.36.1/lib/strutils.c:283:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. return ((char *)memcpy(dest, src, n)) + n; data/util-linux-2.36.1/lib/strutils.c:318:18: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. return (char *) memcpy(new, s, len); data/util-linux-2.36.1/lib/strutils.c:586:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/util-linux-2.36.1/lib/strutils.c:590:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char suffix[sizeof(" KiB")], *psuf = suffix; data/util-linux-2.36.1/lib/strutils.c:942:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(r, s, a); data/util-linux-2.36.1/lib/strutils.c:943:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(r + a, suffix, b); data/util-linux-2.36.1/lib/strutils.c:1009:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char quotechars[2] = {*current, '\0'}; data/util-linux-2.36.1/lib/sysfs.c:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[sizeof(_PATH_SYS_DEVBLOCK) data/util-linux-2.36.1/lib/sysfs.c:180:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char link[PATH_MAX]; data/util-linux-2.36.1/lib/sysfs.c:199:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, name, sz + 1); data/util-linux-2.36.1/lib/sysfs.c:206:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[NAME_MAX + 6 + 1]; data/util-linux-2.36.1/lib/sysfs.c:358:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(chain + len, SUBSYSTEM_LINKNAME, sizeof(SUBSYSTEM_LINKNAME)); data/util-linux-2.36.1/lib/sysfs.c:404:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, prefix, psz); data/util-linux-2.36.1/lib/sysfs.c:406:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + psz, _PATH_SYS_DEVBLOCK "/", sizeof(_PATH_SYS_DEVBLOCK "/") - 1); data/util-linux-2.36.1/lib/sysfs.c:419:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char subbuf[PATH_MAX]; data/util-linux-2.36.1/lib/sysfs.c:458:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX], *chain, *sub; data/util-linux-2.36.1/lib/sysfs.c:566:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linkpath[PATH_MAX]; data/util-linux-2.36.1/lib/sysfs.c:669:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX], *hctl; data/util-linux-2.36.1/lib/sysfs.c:742:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/util-linux-2.36.1/lib/sysfs.c:750:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(f = fopen(buf, "r" UL_CLOEXECSTR))) data/util-linux-2.36.1/lib/sysfs.c:761:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX]; data/util-linux-2.36.1/lib/sysfs.c:797:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX]; data/util-linux-2.36.1/lib/sysfs.c:808:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX], linkc[PATH_MAX]; data/util-linux-2.36.1/lib/sysfs.c:832:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(path, "r" UL_CLOEXECSTR); data/util-linux-2.36.1/lib/sysfs.c:844:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX]; data/util-linux-2.36.1/lib/sysfs.c:863:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(buf, "r" UL_CLOEXECSTR); data/util-linux-2.36.1/lib/sysfs.c:876:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX]; data/util-linux-2.36.1/lib/sysfs.c:972:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, "/dev/", 5); data/util-linux-2.36.1/lib/sysfs.c:1020:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX + 1]; data/util-linux-2.36.1/lib/sysfs.c:1040:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX], *sub, *chain; data/util-linux-2.36.1/lib/sysfs.c:1041:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char diskname[32]; data/util-linux-2.36.1/lib/timeutils.c:576:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ISO_BUFSIZ]; data/util-linux-2.36.1/libblkid/src/config.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/libblkid/src/config.c:133:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "r" UL_CLOEXECSTR); data/util-linux-2.36.1/libblkid/src/devname.c:155:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[NAME_MAX + 18 + 1]; data/util-linux-2.36.1/libblkid/src/devname.c:229:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char device[256]; data/util-linux-2.36.1/libblkid/src/devname.c:285:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/util-linux-2.36.1/libblkid/src/devname.c:290:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((lvf = fopen(lvm_device, "r" UL_CLOEXECSTR)) == NULL) { data/util-linux-2.36.1/libblkid/src/devname.c:373:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[100]; data/util-linux-2.36.1/libblkid/src/devname.c:376:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char device[110]; data/util-linux-2.36.1/libblkid/src/devname.c:378:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). procpt = fopen(PROC_EVMS_VOLUMES, "r" UL_CLOEXECSTR); data/util-linux-2.36.1/libblkid/src/devname.c:450:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[1024]; data/util-linux-2.36.1/libblkid/src/devname.c:451:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ptname0[128 + 1], ptname1[128 + 1], *ptname = NULL; data/util-linux-2.36.1/libblkid/src/devname.c:452:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ptnames[2]; data/util-linux-2.36.1/libblkid/src/devname.c:478:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). proc = fopen(PROC_PARTITIONS, "r" UL_CLOEXECSTR); data/util-linux-2.36.1/libblkid/src/devno.c:55:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, a, al); data/util-linux-2.36.1/libblkid/src/devno.c:59:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, b, bl); data/util-linux-2.36.1/libblkid/src/devno.c:63:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, c, cl); data/util-linux-2.36.1/libblkid/src/devno.c:228:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX]; data/util-linux-2.36.1/libblkid/src/devno.c:295:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/util-linux-2.36.1/libblkid/src/devno.c:298:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(_PATH_PROC_DEVICES, "r" UL_CLOEXECSTR); data/util-linux-2.36.1/libblkid/src/devno.c:309:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64 + 1]; data/util-linux-2.36.1/libblkid/src/devno.c:331:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char diskname[PATH_MAX]; data/util-linux-2.36.1/libblkid/src/encode.c:262:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&str_enc[j], &str[i], seqlen); data/util-linux-2.36.1/libblkid/src/encode.c:268:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(&str_enc[j], "\\x%02x", (unsigned char) str[i]); data/util-linux-2.36.1/libblkid/src/evaluate.c:76:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(devname, O_RDONLY|O_CLOEXEC|O_NONBLOCK); data/util-linux-2.36.1/libblkid/src/evaluate.c:110:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uevent[PATH_MAX]; data/util-linux-2.36.1/libblkid/src/evaluate.c:125:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(uevent, "w" UL_CLOEXECSTR); data/util-linux-2.36.1/libblkid/src/evaluate.c:140:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dev[PATH_MAX]; data/util-linux-2.36.1/libblkid/src/partitions/atari.c:27:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[3]; data/util-linux-2.36.1/libblkid/src/partitions/atari.c:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char unused0[0x156]; /* boot code */ data/util-linux-2.36.1/libblkid/src/partitions/atari.c:35:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char unused1[0xc]; data/util-linux-2.36.1/libblkid/src/partitions/dos.c:181:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char idstr[UUID_STR_LEN]; data/util-linux-2.36.1/libblkid/src/partitions/gpt.c:284:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hdr, h, sizeof(*h)); data/util-linux-2.36.1/libblkid/src/partitions/mac.c:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; /* partition name */ data/util-linux-2.36.1/libblkid/src/partitions/mac.c:31:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[32]; /* string type description */ data/util-linux-2.36.1/libblkid/src/partitions/mac.c:42:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char processor[16]; /* identifies ISA of boot */ data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:171:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[UUID_STR_LEN]; /* PT identifier (e.g. UUID for GPT) */ data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:182:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char typestr[UUID_STR_LEN]; /* partition type string (GPT and Mac) */ data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:187:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuid[UUID_STR_LEN]; /* UUID (when supported by PT), e.g GPT */ data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:188:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char name[128]; /* Partition in UTF8 name (when supported by PT), e.g. Mac */ data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:1338:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(item, data, len); data/util-linux-2.36.1/libblkid/src/partitions/solaris_x86.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char v_volume[8]; /* volume name */ data/util-linux-2.36.1/libblkid/src/partitions/solaris_x86.c:57:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char v_asciilabel[128]; /* for compatibility */ data/util-linux-2.36.1/libblkid/src/partitions/unixware.c:67:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d_serial[12]; /* serial number of the device */ data/util-linux-2.36.1/libblkid/src/partitions/unixware.c:87:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char v_name[8]; /* volume name */ data/util-linux-2.36.1/libblkid/src/probe.c:206:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, O_RDONLY|O_CLOEXEC|O_NONBLOCK); data/util-linux-2.36.1/libblkid/src/probe.c:796:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/util-linux-2.36.1/libblkid/src/probe.c:1194:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/libblkid/src/probe.c:1496:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v->data, data, len); data/util-linux-2.36.1/libblkid/src/read.c:366:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; data/util-linux-2.36.1/libblkid/src/read.c:374:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(cache->bic_filename, O_RDONLY|O_CLOEXEC)) < 0) data/util-linux-2.36.1/libblkid/src/save.c:147:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). file = fopen(filename, "w" UL_CLOEXECSTR); data/util-linux-2.36.1/libblkid/src/superblocks/befs.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[B_OS_NAME_LENGTH]; data/util-linux-2.36.1/libblkid/src/superblocks/befs.c:103:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[0]; data/util-linux-2.36.1/libblkid/src/superblocks/befs.c:122:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[0]; data/util-linux-2.36.1/libblkid/src/superblocks/befs.c:408:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uuid, data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:21:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 0 */ unsigned char boot_entry_point[3]; data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:22:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 3 */ unsigned char fs_signature[8]; data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:23:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 11 */ unsigned char __dummy1[67 - 11]; data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:25:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 71 */ unsigned char volume_label[11]; /* "NO NAME\x20\x20\x20\x20" only */ data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:26:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 82 */ unsigned char __dummy2[160 - 82]; data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:27:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 160 */ unsigned char guid[16]; /* BitLocker specific GUID */ data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:33:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 0 */ unsigned char boot_entry_point[3]; data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:34:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 3 */ unsigned char fs_signature[8]; data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:35:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 11 */ unsigned char __dummy[424 - 11]; data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:36:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 424 */ unsigned char guid[16]; data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:42:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 0 */ unsigned char signature[8]; data/util-linux-2.36.1/libblkid/src/superblocks/ddf_raid.c:28:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ddf_rev[8]; /* 01.02.00 */ data/util-linux-2.36.1/libblkid/src/superblocks/ddf_raid.c:80:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[DDF_REV_LENGTH + 1]; data/util-linux-2.36.1/libblkid/src/superblocks/ddf_raid.c:122:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(version, ddf->ddf_rev, sizeof(ddf->ddf_rev)); data/util-linux-2.36.1/libblkid/src/superblocks/drbdmanage.c:27:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char magic[11]; data/util-linux-2.36.1/libblkid/src/superblocks/drbdmanage.c:28:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char uuid[32]; data/util-linux-2.36.1/libblkid/src/superblocks/drbdmanage.c:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char magic[4]; data/util-linux-2.36.1/libblkid/src/superblocks/drbdmanage.c:38:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char persistence_magic[4] = { '\x1a', '\xdb', '\x98', '\xa2' }; data/util-linux-2.36.1/libblkid/src/superblocks/drbdproxy_datalog.c:23:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char uuid[16]; data/util-linux-2.36.1/libblkid/src/superblocks/exfs.c:30:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char sb_uuid[16]; /* file system unique id */ data/util-linux-2.36.1/libblkid/src/superblocks/exfs.c:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sb_fname[12]; /* file system name */ data/util-linux-2.36.1/libblkid/src/superblocks/ext.c:32:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char s_magic[2]; data/util-linux-2.36.1/libblkid/src/superblocks/ext.c:48:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char s_uuid[16]; data/util-linux-2.36.1/libblkid/src/superblocks/ext.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_volume_name[16]; data/util-linux-2.36.1/libblkid/src/superblocks/ext.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_last_mounted[64]; data/util-linux-2.36.1/libblkid/src/superblocks/gfs.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sb_lockproto[GFS_LOCKNAME_LEN]; data/util-linux-2.36.1/libblkid/src/superblocks/gfs.c:54:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sb_locktable[GFS_LOCKNAME_LEN]; data/util-linux-2.36.1/libblkid/src/superblocks/hfs.c:135:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char const hash_init[UL_MD5LENGTH] = { data/util-linux-2.36.1/libblkid/src/superblocks/hfs.c:139:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char uuid[UL_MD5LENGTH]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:24:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char year[4]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:25:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char month[2]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:26:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char day[2]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:27:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hour[2]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:28:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char minute[2]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:29:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char second[2]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:30:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hundredth[2]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:37:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char vd_id[5]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:40:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char system_id[32]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:41:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char volume_id[32]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:42:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char unused[8]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:43:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char space_size[8]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:44:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char escape_sequences[8]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:45:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char unused1[222]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:46:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char publisher_id[128]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:47:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char unused2[128]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:48:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char application_id[128]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:49:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char unused3[111]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:57:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char vd_id[5]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:59:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char boot_system_id[32]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:60:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char boot_id[32]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:61:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char unused[1]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:73:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char foo[8]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:75:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char id[5]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:78:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char system_id[32]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:79:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char volume_id[32]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:112:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[16]; data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:172:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char label[32]; data/util-linux-2.36.1/libblkid/src/superblocks/jfs.c:22:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char js_magic[4]; data/util-linux-2.36.1/libblkid/src/superblocks/jfs.c:32:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char js_uuid[16]; data/util-linux-2.36.1/libblkid/src/superblocks/jfs.c:33:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char js_label[16]; data/util-linux-2.36.1/libblkid/src/superblocks/jfs.c:34:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char js_loguuid[16]; data/util-linux-2.36.1/libblkid/src/superblocks/linux_raid.c:48:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char set_name[32]; /* set and interpreted by user-space */ data/util-linux-2.36.1/libblkid/src/superblocks/luks.c:57:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char magic[LUKS_MAGIC_L]; data/util-linux-2.36.1/libblkid/src/superblocks/luks.c:61:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[LUKS2_LABEL_L]; data/util-linux-2.36.1/libblkid/src/superblocks/luks.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char checksum_alg[LUKS2_CHECKSUM_ALG_L]; data/util-linux-2.36.1/libblkid/src/superblocks/luks.c:64:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuid[UUID_STRING_L]; data/util-linux-2.36.1/libblkid/src/superblocks/luks.c:65:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char subsystem[LUKS2_LABEL_L]; /* owner subsystem label */ data/util-linux-2.36.1/libblkid/src/superblocks/luks.c:67:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _padding[184]; data/util-linux-2.36.1/libblkid/src/superblocks/lvm.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuid[LVM2_ID_LEN + 7]; data/util-linux-2.36.1/libblkid/src/superblocks/lvm.c:126:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuid[LVM2_ID_LEN + 7]; data/util-linux-2.36.1/libblkid/src/superblocks/mpool.c:21:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char osb_poolid[16]; /* UUID of pool this drive belongs to */ data/util-linux-2.36.1/libblkid/src/superblocks/nilfs.c:59:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_volume_name[80]; data/util-linux-2.36.1/libblkid/src/superblocks/nilfs.c:72:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char sum[4]; data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:18:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char minor_version[4]; data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:19:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char major_version[4]; data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:20:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char signature[128]; data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:21:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mount[128]; data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:22:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mount_len[2]; data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:26:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char disk_lock[48]; data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:27:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[64]; data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:28:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char label_len[2]; data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:29:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char vol_id[16]; data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:30:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char vol_id_len[2]; data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:96:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dummy[32]; data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:97:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dl_tag[8]; data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dl_id[24]; data/util-linux-2.36.1/libblkid/src/superblocks/reiserfs.c:27:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char rs_magic[12]; data/util-linux-2.36.1/libblkid/src/superblocks/reiserfs.c:29:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char rs_uuid[16]; data/util-linux-2.36.1/libblkid/src/superblocks/reiserfs.c:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rs_label[16]; data/util-linux-2.36.1/libblkid/src/superblocks/reiserfs.c:34:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char rs4_magic[16]; data/util-linux-2.36.1/libblkid/src/superblocks/reiserfs.c:37:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char rs4_uuid[16]; data/util-linux-2.36.1/libblkid/src/superblocks/reiserfs.c:38:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char rs4_label[16]; data/util-linux-2.36.1/libblkid/src/superblocks/romfs.c:21:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ros_magic[8]; data/util-linux-2.36.1/libblkid/src/superblocks/romfs.c:23:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ros_volume[16]; data/util-linux-2.36.1/libblkid/src/superblocks/silicon_raid.c:79:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&val, ptr, sizeof(uint16_t)); data/util-linux-2.36.1/libblkid/src/superblocks/swap.c:27:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char uuid[16]; data/util-linux-2.36.1/libblkid/src/superblocks/swap.c:28:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char volume[16]; data/util-linux-2.36.1/libblkid/src/superblocks/udf.c:73:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char domain_id[23]; data/util-linux-2.36.1/libblkid/src/superblocks/udf.c:126:52: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static inline int gen_uuid_from_volset_id(unsigned char uuid[17], struct dstring128 *volset_id) data/util-linux-2.36.1/libblkid/src/superblocks/udf.c:133:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[17]; data/util-linux-2.36.1/libblkid/src/superblocks/udf.c:344:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char uuid[17]; data/util-linux-2.36.1/libblkid/src/superblocks/vdo.c:19:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char magic[8]; /* magic number 'dmvdo001'*/ data/util-linux-2.36.1/libblkid/src/superblocks/vdo.c:20:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char unused[32]; /* 32 bytes of unimportant space */ data/util-linux-2.36.1/libblkid/src/superblocks/vdo.c:21:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char sb_uuid[16]; /* vdo unique id */ data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:25:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 00*/ unsigned char vs_ignored[3]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:26:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 03*/ unsigned char vs_sysid[8]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:27:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 0b*/ unsigned char vs_sector_size[2]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:31:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 11*/ unsigned char vs_dir_entries[2]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:32:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 13*/ unsigned char vs_sectors[2]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:46:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 40*/ unsigned char vs_unknown[3]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:47:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 43*/ unsigned char vs_serno[4]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:48:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 47*/ unsigned char vs_label[11]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:49:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 52*/ unsigned char vs_magic[8]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:50:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 5a*/ unsigned char vs_dummy2[0x1fe - 0x5a]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:51:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /*1fe*/ unsigned char vs_pmagic[2]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:56:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 00*/ unsigned char ms_ignored[3]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:57:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 03*/ unsigned char ms_sysid[8]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:58:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 0b*/ unsigned char ms_sector_size[2]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:62:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 11*/ unsigned char ms_dir_entries[2]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:63:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 13*/ unsigned char ms_sectors[2]; /* =0 iff V3 or later */ data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:72:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 24*/ unsigned char ms_unknown[3]; /* Phys drive no., resvd, V4 sig (0x29) */ data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:73:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 27*/ unsigned char ms_serno[4]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:74:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 2b*/ unsigned char ms_label[11]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:75:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 36*/ unsigned char ms_magic[8]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:76:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /* 3e*/ unsigned char ms_dummy2[0x1fe - 0x3e]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:77:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. /*1fe*/ unsigned char ms_pmagic[2]; data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:117:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (((unsigned char *) x)[0] + (((unsigned char *) x)[1] << 8)) data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:117:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (((unsigned char *) x)[0] + (((unsigned char *) x)[1] << 8)) data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:341:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vol_label_buf, vol_label, 11); data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:381:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vol_label_buf, vol_label, 11); data/util-linux-2.36.1/libblkid/src/superblocks/vmfs.c:15:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[128]; data/util-linux-2.36.1/libblkid/src/superblocks/xfs.c:29:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char sb_uuid[16]; /* file system unique id */ data/util-linux-2.36.1/libblkid/src/superblocks/xfs.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sb_fname[12]; /* file system name */ data/util-linux-2.36.1/libblkid/src/superblocks/xfs.c:199:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char h_uuid[16]; data/util-linux-2.36.1/libblkid/src/superblocks/zfs.c:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nvp_name[0]; /* aligned to 4 bytes */ data/util-linux-2.36.1/libblkid/src/superblocks/zfs.c:55:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char nvs_string[0]; data/util-linux-2.36.1/libblkid/src/superblocks/zonefs.c:31:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_label[ZONEFS_LABEL_SIZE]; data/util-linux-2.36.1/libblkid/src/topology/dm.c:67:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *dmargv[7]; data/util-linux-2.36.1/libblkid/src/topology/dm.c:68:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char maj[16], min[16]; data/util-linux-2.36.1/libblkid/src/topology/lvm.c:57:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cmd = (char *) paths[i]; data/util-linux-2.36.1/libblkid/src/topology/lvm.c:77:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *lvargv[3]; data/util-linux-2.36.1/libblkid/src/topology/md.c:100:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(diskpath, O_RDONLY|O_CLOEXEC); data/util-linux-2.36.1/libblkid/src/topology/topology.c:220:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) chn->data + structoff, &data, sizeof(data)); data/util-linux-2.36.1/libblkid/src/verify.c:129:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(dev->bid_name, O_RDONLY|O_CLOEXEC|O_NONBLOCK); data/util-linux-2.36.1/libfdisk/src/ask.c:450:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char range[BUFSIZ], *ptr = range; data/util-linux-2.36.1/libfdisk/src/ask.c:1039:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char range[BUFSIZ], *ptr = range; data/util-linux-2.36.1/libfdisk/src/bsd.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bsdbuffer[BSD_BBSIZE] __attribute__((aligned(8))); data/util-linux-2.36.1/libfdisk/src/bsd.c:87:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bsdbuffer[BSD_BBSIZE]; data/util-linux-2.36.1/libfdisk/src/bsd.c:641:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(path, O_RDONLY)) < 0) { data/util-linux-2.36.1/libfdisk/src/bsd.c:668:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/libfdisk/src/bsd.c:749:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&val, ptr, sizeof(unsigned short)); data/util-linux-2.36.1/libfdisk/src/context.c:679:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(fname, (readonly ? O_RDONLY : O_RDWR ) | O_CLOEXEC); data/util-linux-2.36.1/libfdisk/src/dos.c:1883:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hint[BUFSIZ]; data/util-linux-2.36.1/libfdisk/src/dos.c:2018:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char empty[512] = { 0 }; data/util-linux-2.36.1/libfdisk/src/gpt.c:260:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[UUID_STR_LEN]; data/util-linux-2.36.1/libfdisk/src/gpt.c:469:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[UUID_STR_LEN]; data/util-linux-2.36.1/libfdisk/src/gpt.c:671:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&header->disk_guid, data/util-linux-2.36.1/libfdisk/src/gpt.c:705:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&res->disk_guid, &src->disk_guid, sizeof(src->disk_guid)); data/util-linux-2.36.1/libfdisk/src/gpt.c:1721:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, GPT_ATTRSTR_REQ, (l = sizeof(GPT_ATTRSTR_REQ))); data/util-linux-2.36.1/libfdisk/src/gpt.c:1727:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, GPT_ATTRSTR_NOBLOCK, (l = sizeof(GPT_ATTRSTR_NOBLOCK))); data/util-linux-2.36.1/libfdisk/src/gpt.c:1733:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, GPT_ATTRSTR_LEGACY, (l = sizeof(GPT_ATTRSTR_LEGACY))); data/util-linux-2.36.1/libfdisk/src/gpt.c:1745:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, "GUID:%u", n); data/util-linux-2.36.1/libfdisk/src/gpt.c:1747:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, ",%u", n); data/util-linux-2.36.1/libfdisk/src/gpt.c:1841:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char u_str[UUID_STR_LEN]; data/util-linux-2.36.1/libfdisk/src/gpt.c:1911:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char new_u[UUID_STR_LEN], old_u[UUID_STR_LEN]; data/util-linux-2.36.1/libfdisk/src/gpt.c:2577:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[UUID_STR_LEN]; data/util-linux-2.36.1/libfdisk/src/partition.c:90:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(n, o, sizeof(*n)); data/util-linux-2.36.1/libfdisk/src/script.c:122:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "r"); data/util-linux-2.36.1/libfdisk/src/script.c:452:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/util-linux-2.36.1/libfdisk/src/script.c:1394:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ] = { '\0' }; data/util-linux-2.36.1/libfdisk/src/script.c:1588:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(f = fopen(filename, "r"))) data/util-linux-2.36.1/libfdisk/src/script.c:1606:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ] = { '\0' }; data/util-linux-2.36.1/libfdisk/src/sgi.c:107:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char scsi_string[50]; data/util-linux-2.36.1/libfdisk/src/sgi.c:108:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char serial[137]; data/util-linux-2.36.1/libfdisk/src/sgi.c:110:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char installer[225]; data/util-linux-2.36.1/libfdisk/src/sgi.c:126:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy((char *) info->scsi_string, "IBM OEM 0662S12 3 30"); data/util-linux-2.36.1/libfdisk/src/sgi.c:127:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy((char *) info->serial, "0000"); data/util-linux-2.36.1/libfdisk/src/sgi.c:129:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy((char *) info->installer, "Sfx version 5.3, Oct 18, 1994"); data/util-linux-2.36.1/libfdisk/src/sgi.c:156:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) sgilabel->volume[0].name, "sgilabel", 8); data/util-linux-2.36.1/libfdisk/src/sgi.c:458:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sgilabel->boot_file, name, sz); data/util-linux-2.36.1/libfdisk/src/sgi.c:820:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mesg[256]; data/util-linux-2.36.1/libfdisk/src/sgi.c:1011:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy((char *) sgilabel->boot_file, "/unix"); data/util-linux-2.36.1/libfdisk/src/sun.c:514:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mesg[256]; data/util-linux-2.36.1/libmount/python/tab.c:166:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(f = fopen(path, "w"))) data/util-linux-2.36.1/libmount/src/cache.c:231:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(key, tagname, tksz + 1); /* include '\0' */ data/util-linux-2.36.1/libmount/src/cache.c:232:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(key + tksz + 1, tagval, vlsz + 1); data/util-linux-2.36.1/libmount/src/cache.c:732:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[BUFSIZ]; data/util-linux-2.36.1/libmount/src/cache.c:755:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[BUFSIZ]; data/util-linux-2.36.1/libmount/src/cache.c:778:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[BUFSIZ]; data/util-linux-2.36.1/libmount/src/context.c:2121:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char helper[PATH_MAX]; data/util-linux-2.36.1/libmount/src/context.c:3024:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). cxt->ns_orig.fd = open("/proc/self/ns/mnt", O_RDONLY | O_CLOEXEC); data/util-linux-2.36.1/libmount/src/context.c:3031:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). tmp = open(path, O_RDONLY | O_CLOEXEC); data/util-linux-2.36.1/libmount/src/context_mount.c:645:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *args[14], *type; data/util-linux-2.36.1/libmount/src/context_umount.c:294:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(tgt, O_PATH); data/util-linux-2.36.1/libmount/src/context_umount.c:453:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uidstr[sizeof(stringify_value(ULONG_MAX))]; data/util-linux-2.36.1/libmount/src/context_umount.c:690:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *args[12], *type; data/util-linux-2.36.1/libmount/src/context_veritydev.c:43:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[3] = "xx\0", *endp, *bytes; data/util-linux-2.36.1/libmount/src/context_veritydev.c:56:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, &hex[i * 2], 2); data/util-linux-2.36.1/libmount/src/context_veritydev.c:125:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(mapper_device, "libmnt_"); data/util-linux-2.36.1/libmount/src/context_veritydev.c:375:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(mapper_device_full, "/dev/mapper/"); data/util-linux-2.36.1/libmount/src/fs.c:152:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dest, src, sz); data/util-linux-2.36.1/libmount/src/fs.c:746:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(res, ro ? "ro" : "rw", 3); data/util-linux-2.36.1/libmount/src/fs.c:748:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(res, ro ? "ro," : "rw,", 3); data/util-linux-2.36.1/libmount/src/lock.c:160:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ml->lockfile + sz - 1, ".lock", 6); data/util-linux-2.36.1/libmount/src/lock.c:163:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ml->lockfile + sz - 5, "~", 2); data/util-linux-2.36.1/libmount/src/lock.c:224:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ml->lockfile_fd = open(lfile, O_RDONLY|O_CREAT|O_CLOEXEC, data/util-linux-2.36.1/libmount/src/lock.c:427:6: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). i = open(linkfile, O_WRONLY|O_CREAT|O_CLOEXEC, S_IRUSR|S_IWUSR); data/util-linux-2.36.1/libmount/src/lock.c:459:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ml->lockfile_fd = open(lockfile, O_WRONLY|O_CLOEXEC); data/util-linux-2.36.1/libmount/src/lock.c:594:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/util-linux-2.36.1/libmount/src/lock.c:596:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(f = fopen(filename, "r" UL_CLOEXECSTR))) data/util-linux-2.36.1/libmount/src/lock.c:603:8: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atol(buf) + 1; data/util-linux-2.36.1/libmount/src/lock.c:605:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(f = fopen(filename, "w" UL_CLOEXECSTR))) data/util-linux-2.36.1/libmount/src/lock.c:642:23: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). synctime = (time_t) atol(argv[idx + 1]); data/util-linux-2.36.1/libmount/src/lock.c:653:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). loops = atoi(argv[idx++]); data/util-linux-2.36.1/libmount/src/monitor.c:314:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[sizeof(struct inotify_event) + NAME_MAX + 1]; data/util-linux-2.36.1/libmount/src/monitor.c:463:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). me->fd = open(me->path, O_RDONLY|O_CLOEXEC); data/util-linux-2.36.1/libmount/src/optstr.c:207:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, name, nsz); data/util-linux-2.36.1/libmount/src/optstr.c:212:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, value, vsz); data/util-linux-2.36.1/libmount/src/optstr.c:418:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pos, substr, subsz); data/util-linux-2.36.1/libmount/src/optstr.c:470:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ol.value, value, ol.valsz); data/util-linux-2.36.1/libmount/src/optstr.c:766:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(next, o, 2); data/util-linux-2.36.1/libmount/src/optstr.c:931:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, raw, sz); data/util-linux-2.36.1/libmount/src/optstr.c:950:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[40]; data/util-linux-2.36.1/libmount/src/tab.c:1423:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char subvolidstr[sizeof(stringify_value(UINT64_MAX))]; data/util-linux-2.36.1/libmount/src/tab.c:1428:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(subvolidstr, vol, volsz); data/util-linux-2.36.1/libmount/src/tab.c:1458:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char default_id_str[sizeof(stringify_value(UINT64_MAX))]; data/util-linux-2.36.1/libmount/src/tab.c:1512:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, vol, volsz); data/util-linux-2.36.1/libmount/src/tab_parse.c:844:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, O_RDONLY|O_CLOEXEC); data/util-linux-2.36.1/libmount/src/tab_parse.c:864:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "r" UL_CLOEXECSTR); data/util-linux-2.36.1/libmount/src/tab_parse.c:907:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dd = open(dirname, O_RDONLY|O_CLOEXEC|O_DIRECTORY); data/util-linux-2.36.1/libmount/src/utils.c:57:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((*a) + al, b, bl + 1); data/util-linux-2.36.1/libmount/src/utils.c:156:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[PATH_MAX]; data/util-linux-2.36.1/libmount/src/utils.c:200:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*filename, ".", 2); data/util-linux-2.36.1/libmount/src/utils.c:533:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[129]; data/util-linux-2.36.1/libmount/src/utils.c:535:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "r" UL_CLOEXECSTR); data/util-linux-2.36.1/libmount/src/utils.c:542:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[sizeof(line)]; data/util-linux-2.36.1/libmount/src/utils.c:732:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(filename, O_RDWR|O_CREAT|O_CLOEXEC, data/util-linux-2.36.1/libmount/src/utils.c:992:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mnt, "/", 2); data/util-linux-2.36.1/libmount/src/utils.c:1024:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; /* see kernel include/asm-generic/setup.h: COMMAND_LINE_SIZE */ data/util-linux-2.36.1/libmount/src/utils.c:1035:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(path, "r" UL_CLOEXECSTR); data/util-linux-2.36.1/libmount/src/utils.c:1102:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX]; data/util-linux-2.36.1/libmount/src/utils.c:1309:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int rc = 0, fd = open(filename, O_RDONLY); data/util-linux-2.36.1/libsmartcols/samples/continuous.c:109:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(timecell, "%f [%3d%%]", diff, data/util-linux-2.36.1/libsmartcols/samples/fromfile.c:268:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *f = fopen(optarg, "r"); data/util-linux-2.36.1/libsmartcols/samples/fromfile.c:333:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *f = fopen(argv[optind], "r"); data/util-linux-2.36.1/libsmartcols/samples/tree.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modbuf[11], *p; data/util-linux-2.36.1/libsmartcols/samples/tree.c:95:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(name, O_RDONLY|O_NONBLOCK|O_DIRECTORY|O_CLOEXEC); data/util-linux-2.36.1/libsmartcols/samples/wrap.c:61:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/libsmartcols/src/buffer.c:65:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf->cur, str, sz + 1); data/util-linux-2.36.1/libsmartcols/src/line.c:164:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ce, &ln->cells[oldn], sizeof(struct libscols_cell)); data/util-linux-2.36.1/libsmartcols/src/line.c:177:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ln->cells[newn], &ce, sizeof(struct libscols_cell)); data/util-linux-2.36.1/libuuid/src/gen_uuid.c:137:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/util-linux-2.36.1/libuuid/src/gen_uuid.c:200:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(node_id, a, 6); data/util-linux-2.36.1/libuuid/src/gen_uuid.c:238:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). state_fd = open(LIBUUID_CLOCK_FILE, O_RDWR|O_CREAT|O_CLOEXEC, 0660); data/util-linux-2.36.1/libuuid/src/gen_uuid.c:343:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char op_buf[64]; data/util-linux-2.36.1/libuuid/src/gen_uuid.c:366:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(op_buf+1, num, sizeof(*num)); data/util-linux-2.36.1/libuuid/src/gen_uuid.c:385:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(op_buf+16, num, sizeof(int)); data/util-linux-2.36.1/libuuid/src/gen_uuid.c:387:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, op_buf, 16); data/util-linux-2.36.1/libuuid/src/gen_uuid.c:408:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char node_id[6]; data/util-linux-2.36.1/libuuid/src/gen_uuid.c:430:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uu.node, node_id, 6); data/util-linux-2.36.1/libuuid/src/gen_uuid.c:565:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hash[UL_MD5LENGTH]; data/util-linux-2.36.1/libuuid/src/gen_uuid.c:591:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hash[UL_SHA1LENGTH]; data/util-linux-2.36.1/libuuid/src/pack.c:67:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out+10, uu->node, 6); data/util-linux-2.36.1/libuuid/src/parse.c:56:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[3]; data/util-linux-2.36.1/libuuid/src/test_uuid.c:52:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * validStr[2] = {"invalid", "valid"}; data/util-linux-2.36.1/libuuid/src/test_uuid.c:71:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[UUID_STR_LEN]; data/util-linux-2.36.1/libuuid/src/test_uuid.c:74:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(file, O_RDONLY)) < 0) { data/util-linux-2.36.1/libuuid/src/unpack.c:61:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uu->node, ptr, 6); data/util-linux-2.36.1/libuuid/src/unparse.c:39:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char const hexdigits_lower[16] = "0123456789abcdef"; data/util-linux-2.36.1/libuuid/src/unparse.c:40:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char const hexdigits_upper[16] = "0123456789ABCDEF"; data/util-linux-2.36.1/libuuid/src/unparse.c:42:41: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static void uuid_fmt(const uuid_t uuid, char *buf, char const fmt[restrict]) data/util-linux-2.36.1/libuuid/src/unparse.c:42:52: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static void uuid_fmt(const uuid_t uuid, char *buf, char const fmt[restrict]) data/util-linux-2.36.1/libuuid/src/uuid.h:44:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef unsigned char uuid_t[16]; data/util-linux-2.36.1/login-utils/islocal.c:37:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen(filename, "r"))) data/util-linux-2.36.1/login-utils/last.c:179:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[UCHUNKSIZE]; data/util-linux-2.36.1/login-utils/last.c:180:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[1024]; data/util-linux-2.36.1/login-utils/last.c:220:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(u, buf + bpos, sizeof(struct utmpx)); data/util-linux-2.36.1/login-utils/last.c:235:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp + (-bpos), buf, utsize + bpos); data/util-linux-2.36.1/login-utils/last.c:253:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp, buf + UCHUNKSIZE + bpos, -bpos); data/util-linux-2.36.1/login-utils/last.c:256:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(u, tmp, sizeof(struct utmpx)); data/util-linux-2.36.1/login-utils/last.c:266:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char s[CTIME_BUFSIZ]; data/util-linux-2.36.1/login-utils/last.c:326:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sin6.sin6_addr.s6_addr, a, 16); data/util-linux-2.36.1/login-utils/last.c:353:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[CTIME_BUFSIZ]; data/util-linux-2.36.1/login-utils/last.c:392:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char logintime[LAST_TIMESTAMP_LEN]; data/util-linux-2.36.1/login-utils/last.c:393:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char logouttime[LAST_TIMESTAMP_LEN]; data/util-linux-2.36.1/login-utils/last.c:394:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char length[LAST_TIMESTAMP_LEN]; data/util-linux-2.36.1/login-utils/last.c:395:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char final[512]; data/util-linux-2.36.1/login-utils/last.c:396:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char utline[sizeof(p->ut_line) + 1]; data/util-linux-2.36.1/login-utils/last.c:397:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char domain[256]; data/util-linux-2.36.1/login-utils/last.c:451:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(logouttime, "- "); data/util-linux-2.36.1/login-utils/last.c:458:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(logouttime, " still running"); data/util-linux-2.36.1/login-utils/last.c:461:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(logouttime, " still"); data/util-linux-2.36.1/login-utils/last.c:462:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(length, "running"); data/util-linux-2.36.1/login-utils/last.c:465:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(length, "(%d+%02d:%02d)", days, abs(hours), abs(mins)); /* hours and mins always shown as positive (w/o minus sign!) even if secs < 0 */ data/util-linux-2.36.1/login-utils/last.c:467:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(length, " (%02d:%02d)", hours, abs(mins)); /* mins always shown as positive (w/o minus sign!) even if secs < 0 */ data/util-linux-2.36.1/login-utils/last.c:469:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(length, " (%02d:%02d)", hours, mins); data/util-linux-2.36.1/login-utils/last.c:471:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(length, " (-00:%02d)", abs(mins)); /* mins always shown as positive (w/o minus sign!) even if secs < 0 */ data/util-linux-2.36.1/login-utils/last.c:476:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(logouttime, "- crash"); data/util-linux-2.36.1/login-utils/last.c:479:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(logouttime, "- down "); data/util-linux-2.36.1/login-utils/last.c:483:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(logouttime, " still logged in"); data/util-linux-2.36.1/login-utils/last.c:486:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(logouttime, " still"); data/util-linux-2.36.1/login-utils/last.c:487:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(length, "logged in"); data/util-linux-2.36.1/login-utils/last.c:492:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(logouttime, " gone - no logout"); data/util-linux-2.36.1/login-utils/last.c:495:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(logouttime, " gone"); data/util-linux-2.36.1/login-utils/last.c:496:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(length, "- no logout"); data/util-linux-2.36.1/login-utils/last.c:499:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(length, "no logout"); data/util-linux-2.36.1/login-utils/last.c:606:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[sizeof(ut->ut_line) + 16]; data/util-linux-2.36.1/login-utils/last.c:620:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(f = fopen(path, "r"))) data/util-linux-2.36.1/login-utils/last.c:629:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char utline[sizeof(ut->ut_line) + 1]; data/util-linux-2.36.1/login-utils/last.c:678:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(filename, "r")) == NULL) data/util-linux-2.36.1/login-utils/last.c:768:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ut.ut_line, "system down"); data/util-linux-2.36.1/login-utils/last.c:784:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ut.ut_line, "system boot"); data/util-linux-2.36.1/login-utils/last.c:792:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ut.ut_line, "(to lvl %c)", x); data/util-linux-2.36.1/login-utils/last.c:852:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p->ut, &ut, sizeof(struct utmpx)); data/util-linux-2.36.1/login-utils/last.c:891:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timestr[LAST_TIMESTAMP_LEN]; data/util-linux-2.36.1/login-utils/login.c:127:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vcsn[VCS_PATH_MAX]; /* virtual console name */ data/util-linux-2.36.1/login-utils/login.c:128:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vcsan[VCS_PATH_MAX]; data/util-linux-2.36.1/login-utils/login.c:134:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostaddress[16]; /* remote address */ data/util-linux-2.36.1/login-utils/login.c:152:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char timeout_msg[128]; data/util-linux-2.36.1/login-utils/login.c:274:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dd = open(dirname, O_RDONLY|O_CLOEXEC|O_DIRECTORY); data/util-linux-2.36.1/login-utils/login.c:337:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(file, O_RDONLY, 0); data/util-linux-2.36.1/login-utils/login.c:365:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(tty, O_RDWR | O_NONBLOCK); data/util-linux-2.36.1/login-utils/login.c:589:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(_PATH_LASTLOG, O_RDWR, 0); data/util-linux-2.36.1/login-utils/login.c:600:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_string[CTIME_BUFSIZ]; data/util-linux-2.36.1/login-utils/login.c:1082:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[PATH_MAX]; data/util-linux-2.36.1/login-utils/login.c:1153:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cxt->hostaddress, &(sa->sin_addr), sizeof(sa->sin_addr)); data/util-linux-2.36.1/login-utils/login.c:1163:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cxt->hostaddress, &addr, sizeof(struct in_addr)); data/util-linux-2.36.1/login-utils/login.c:1166:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cxt->hostaddress, &(sa->sin6_addr), sizeof(sa->sin6_addr)); data/util-linux-2.36.1/login-utils/login.c:1193:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *childArgv[10]; data/util-linux-2.36.1/login-utils/login.c:1432:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tbuf[PATH_MAX + 2], *p; data/util-linux-2.36.1/login-utils/logindefs.c:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/login-utils/logindefs.c:100:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "r"); data/util-linux-2.36.1/login-utils/logindefs.c:435:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(path, mode); data/util-linux-2.36.1/login-utils/logindefs.c:475:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/login-utils/logindefs.c:503:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(file, "r"); data/util-linux-2.36.1/login-utils/lslogins.c:329:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64] = {0}; data/util-linux-2.36.1/login-utils/lslogins.c:1642:23: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ctl->lastlogin_fd = open(path_lastlog, O_RDONLY, 0); data/util-linux-2.36.1/login-utils/newgrp.c:87:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/login-utils/newgrp.c:94:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(_PATH_GSHADOW, "r"); data/util-linux-2.36.1/login-utils/nologin.c:92:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(_PATH_NOLOGIN_TXT, O_RDONLY); data/util-linux-2.36.1/login-utils/nologin.c:100:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/login-utils/setpwnam.c:97:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). pwf = fopen(PASSWD_FILE, "r"); data/util-linux-2.36.1/login-utils/su-common.c:818:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(args + argno, additional_args, n_additional_args * sizeof *args); data/util-linux-2.36.1/login-utils/sulogin-consoles.c:163:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(fp = fopen(file, "r" UL_CLOEXECSTR))) data/util-linux-2.36.1/login-utils/sulogin-consoles.c:239:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX]; data/util-linux-2.36.1/login-utils/sulogin-consoles.c:357:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[16 + 1]; data/util-linux-2.36.1/login-utils/sulogin-consoles.c:364:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fc = fopen("/proc/consoles", "r" UL_CLOEXECSTR); data/util-linux-2.36.1/login-utils/sulogin-consoles.c:505:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(name, O_RDWR|O_NONBLOCK|O_NOCTTY|O_CLOEXEC)) < 0) { data/util-linux-2.36.1/login-utils/sulogin-consoles.c:567:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(device, O_RDWR|O_NONBLOCK|O_NOCTTY|O_CLOEXEC); data/util-linux-2.36.1/login-utils/sulogin-consoles.c:632:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(device, O_RDWR|O_NONBLOCK|O_NOCTTY|O_CLOEXEC); data/util-linux-2.36.1/login-utils/sulogin-consoles.c:809:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(name, O_RDWR); data/util-linux-2.36.1/login-utils/sulogin.c:324:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[5]; data/util-linux-2.36.1/login-utils/sulogin.c:414:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char line[2 * BUFSIZ]; data/util-linux-2.36.1/login-utils/sulogin.c:415:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char sline[2 * BUFSIZ]; data/util-linux-2.36.1/login-utils/sulogin.c:443:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(_PATH_PASSWD, "r")) == NULL) { data/util-linux-2.36.1/login-utils/sulogin.c:480:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(_PATH_SHADOW_PASSWD, "r")) == NULL) { data/util-linux-2.36.1/login-utils/sulogin.c:609:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char pass[128], *ptr; data/util-linux-2.36.1/login-utils/sulogin.c:722:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shell[PATH_MAX]; data/util-linux-2.36.1/login-utils/sulogin.c:723:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char home[PATH_MAX]; data/util-linux-2.36.1/login-utils/sulogin.c:953:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((con->fd = open(con->tty, O_RDWR | O_NOCTTY | O_NONBLOCK)) < 0) data/util-linux-2.36.1/login-utils/utmpdump.c:78:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return (suseconds_t) atoi(s + 1); data/util-linux-2.36.1/login-utils/utmpdump.c:93:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[INET6_ADDRSTRLEN]; data/util-linux-2.36.1/login-utils/utmpdump.c:94:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_string[40]; data/util-linux-2.36.1/login-utils/utmpdump.c:133:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(in = fopen(filename, "r"))) data/util-linux-2.36.1/login-utils/utmpdump.c:160:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NEVENTS * sizeof(struct inotify_event)]; data/util-linux-2.36.1/login-utils/utmpdump.c:269:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_addr[INET6_ADDRSTRLEN + 1], s_time[29], *linestart, *line; data/util-linux-2.36.1/login-utils/utmpdump.c:352:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(optarg, "w"); data/util-linux-2.36.1/login-utils/utmpdump.c:372:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(filename, "r"); data/util-linux-2.36.1/login-utils/vipw.c:86:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char orig_file[FILENAMELEN]; /* original file /etc/passwd or /etc/group */ data/util-linux-2.36.1/login-utils/vipw.c:94:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8 * 1024]; data/util-linux-2.36.1/login-utils/vipw.c:155:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[FILENAMELEN + 4]; data/util-linux-2.36.1/login-utils/vipw.c:259:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). passwd_file = open(orig_file, O_RDONLY | O_CLOEXEC, 0); data/util-linux-2.36.1/login-utils/vipw.c:277:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). tmp_fd = fopen(tmp_file, "r" UL_CLOEXECSTR); data/util-linux-2.36.1/login-utils/vipw.c:357:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char response[80]; data/util-linux-2.36.1/misc-utils/blkid.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *show[128]; data/util-linux-2.36.1/misc-utils/blkid.c:201:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mtpt[80]; data/util-linux-2.36.1/misc-utils/blkid.c:252:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char enc[265], safe[256]; data/util-linux-2.36.1/misc-utils/blkid.c:394:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, a, asz); data/util-linux-2.36.1/misc-utils/blkid.c:398:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, b, bsz); data/util-linux-2.36.1/misc-utils/blkid.c:417:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char enc[256]; data/util-linux-2.36.1/misc-utils/blkid.c:507:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(devname, O_RDONLY|O_CLOEXEC|O_NONBLOCK); data/util-linux-2.36.1/misc-utils/cal.c:206:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char day_headings[(WEEK_LEN + 1) * 6 + 1]; data/util-linux-2.36.1/misc-utils/cal.c:217:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *full_month[MONTHS_IN_YEAR]; /* month names */ data/util-linux-2.36.1/misc-utils/cal.c:218:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *abbr_month[MONTHS_IN_YEAR]; /* abbreviated month names */ data/util-linux-2.36.1/misc-utils/cal.c:219:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *weekdays[DAYS_IN_WEEK]; /* day names */ data/util-linux-2.36.1/misc-utils/cal.c:690:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[FMT_ST_CHARS]; data/util-linux-2.36.1/misc-utils/cal.c:780:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[FMT_ST_CHARS]; data/util-linux-2.36.1/misc-utils/cal.c:822:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[FMT_ST_CHARS]; data/util-linux-2.36.1/misc-utils/cal.c:856:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[FMT_ST_CHARS]; data/util-linux-2.36.1/misc-utils/cal.c:921:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[FMT_ST_CHARS]; data/util-linux-2.36.1/misc-utils/cal.c:1059:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[FMT_ST_CHARS]; data/util-linux-2.36.1/misc-utils/cal.c:1226:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lineout[FMT_ST_CHARS]; data/util-linux-2.36.1/misc-utils/cal.c:1245:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lineout[FMT_ST_CHARS]; data/util-linux-2.36.1/misc-utils/fincore.c:170:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char vec[N_PAGES_IN_WINDOW]; data/util-linux-2.36.1/misc-utils/fincore.c:235:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open (name, O_RDONLY)) < 0) { data/util-linux-2.36.1/misc-utils/findmnt-verify.c:308:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80], *cp, *t; data/util-linux-2.36.1/misc-utils/findmnt-verify.c:310:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("/proc/filesystems", "r"); data/util-linux-2.36.1/misc-utils/findmnt-verify.c:345:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/util-linux-2.36.1/misc-utils/findmnt-verify.c:351:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(buf, "r"); data/util-linux-2.36.1/misc-utils/findmnt.c:1113:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(tabfile, "r"); data/util-linux-2.36.1/misc-utils/hardlink.c:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iobuf1[BUFSIZ]; data/util-linux-2.36.1/misc-utils/hardlink.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iobuf2[BUFSIZ]; data/util-linux-2.36.1/misc-utils/hardlink.c:202:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dp->name, name, namelen + 1); data/util-linux-2.36.1/misc-utils/hardlink.c:222:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(name, O_RDONLY); data/util-linux-2.36.1/misc-utils/hardlink.c:271:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd2 = open(fp2->name, O_RDONLY); data/util-linux-2.36.1/misc-utils/hardlink.c:327:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nam2.buf, n2, n2len); data/util-linux-2.36.1/misc-utils/hardlink.c:328:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&nam2.buf[n2len], suffix, data/util-linux-2.36.1/misc-utils/hardlink.c:375:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fp2->name, name, namelen + 1); data/util-linux-2.36.1/misc-utils/hardlink.c:483:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nam1.buf, dp->name, nam1baselen); data/util-linux-2.36.1/misc-utils/hardlink.c:519:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&nam1.buf[nam1baselen], di->d_name, data/util-linux-2.36.1/misc-utils/logger.c:364:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, buf + 8, sz - 8); data/util-linux-2.36.1/misc-utils/logger.c:387:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. fprintf(stderr, "%s\n", (char *) iovec[n].iov_base); data/util-linux-2.36.1/misc-utils/logger.c:414:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char time[32]; data/util-linux-2.36.1/misc-utils/logger.c:481:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char control[CMSG_SPACE(sizeof(struct ucred))]; data/util-linux-2.36.1/misc-utils/logger.c:546:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pid[30], *hostname; data/util-linux-2.36.1/misc-utils/logger.c:782:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fmt[64]; data/util-linux-2.36.1/misc-utils/logger.c:888:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pid[32]; data/util-linux-2.36.1/misc-utils/logger.c:1239:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). jfd = fopen(optarg, "r"); data/util-linux-2.36.1/misc-utils/look.c:156:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(file, O_RDONLY, 0)) < 0 || fstat(fd, &sb)) data/util-linux-2.36.1/misc-utils/lsblk-mnt.c:36:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX]; data/util-linux-2.36.1/misc-utils/lsblk-mnt.c:69:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX]; data/util-linux-2.36.1/misc-utils/lsblk-properties.c:166:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/misc-utils/lsblk.c:341:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX]; data/util-linux-2.36.1/misc-utils/lsblk.c:362:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(dev->filename, O_RDONLY); data/util-linux-2.36.1/misc-utils/lsblk.c:373:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/util-linux-2.36.1/misc-utils/lsblk.c:505:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX]; data/util-linux-2.36.1/misc-utils/lsblk.c:527:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(res + len, sub, sz + 1); data/util-linux-2.36.1/misc-utils/lsblk.c:769:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char md[11] = { '\0' }; data/util-linux-2.36.1/misc-utils/lsblk.c:1379:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX]; data/util-linux-2.36.1/misc-utils/lsblk.c:1436:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX + 1], *name = NULL, *diskname = NULL; data/util-linux-2.36.1/misc-utils/lslocks.c:169:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX], sym[PATH_MAX], *ret = NULL; data/util-linux-2.36.1/misc-utils/lslocks.c:180:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(path, "/proc/%d/fd/", lock_pid); data/util-linux-2.36.1/misc-utils/lslocks.c:236:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX], *tok = NULL; data/util-linux-2.36.1/misc-utils/lslocks.c:241:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(fp = fopen(_PATH_PROC_LOCKS, "r"))) data/util-linux-2.36.1/misc-utils/mcookie.c:55:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[BUFFERSIZE]; data/util-linux-2.36.1/misc-utils/mcookie.c:116:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(fname, O_RDONLY); data/util-linux-2.36.1/misc-utils/mcookie.c:138:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[UL_MD5LENGTH]; data/util-linux-2.36.1/misc-utils/mcookie.c:139:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[RAND_BYTES]; data/util-linux-2.36.1/misc-utils/namei.c:84:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sym[PATH_MAX]; data/util-linux-2.36.1/misc-utils/namei.c:104:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nm->abslink, path, nm->relstart); data/util-linux-2.36.1/misc-utils/namei.c:107:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nm->abslink + nm->relstart, sym, sz - nm->relstart); data/util-linux-2.36.1/misc-utils/namei.c:112:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nm->abslink, sym, sz); data/util-linux-2.36.1/misc-utils/namei.c:131:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(path, dirname, len); data/util-linux-2.36.1/misc-utils/namei.c:132:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(path + len, DOTDOTDIR, sizeof(DOTDOTDIR)); data/util-linux-2.36.1/misc-utils/namei.c:272:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char md[11]; data/util-linux-2.36.1/misc-utils/rename.c:73:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2]; data/util-linux-2.36.1/misc-utils/test_uuidd.c:254:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuid_string[UUID_STR_LEN], *p; data/util-linux-2.36.1/misc-utils/uuidd.c:99:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char op_buf[8]; data/util-linux-2.36.1/misc-utils/uuidd.c:140:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(op_buf + 1, num, sizeof(int)); data/util-linux-2.36.1/misc-utils/uuidd.c:169:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + UUID_LEN, num, sizeof(int)); data/util-linux-2.36.1/misc-utils/uuidd.c:175:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, num, sizeof(int)); data/util-linux-2.36.1/misc-utils/uuidd.c:195:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd_pidfile = open(pidfile_path, O_CREAT | O_RDWR, 0664); data/util-linux-2.36.1/misc-utils/uuidd.c:314:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reply_buf[1024], *cp; data/util-linux-2.36.1/misc-utils/uuidd.c:315:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char op, str[UUID_STR_LEN]; data/util-linux-2.36.1/misc-utils/uuidd.c:364:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply_buf, "%8d\n", getpid()); data/util-linux-2.36.1/misc-utils/uuidd.c:454:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply_buf, "%d", getpid()); data/util-linux-2.36.1/misc-utils/uuidd.c:458:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply_buf, "%d", UUIDD_MAX_OP); data/util-linux-2.36.1/misc-utils/uuidd.c:468:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reply_buf, uu, sizeof(uu)); data/util-linux-2.36.1/misc-utils/uuidd.c:478:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reply_buf, uu, sizeof(uu)); data/util-linux-2.36.1/misc-utils/uuidd.c:491:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reply_buf, uu, sizeof(uu)); data/util-linux-2.36.1/misc-utils/uuidd.c:493:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reply_buf + reply_len, &num, sizeof(num)); data/util-linux-2.36.1/misc-utils/uuidd.c:516:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reply_buf, &num, sizeof(num)); data/util-linux-2.36.1/misc-utils/uuidd.c:540:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024], *cp; data/util-linux-2.36.1/misc-utils/uuidd.c:541:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[UUID_STR_LEN]; data/util-linux-2.36.1/misc-utils/uuidd.c:697:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((ret > 0) && ((do_kill = atoi((char *) buf)) > 0)) { data/util-linux-2.36.1/misc-utils/uuidgen.c:86:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[UUID_STR_LEN]; data/util-linux-2.36.1/misc-utils/uuidparse.c:227:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char date_buf[ISO_BUFSIZ]; data/util-linux-2.36.1/misc-utils/uuidparse.c:274:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuid[UUID_STR_LEN]; data/util-linux-2.36.1/misc-utils/whereis.c:262:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX], *d; data/util-linux-2.36.1/misc-utils/whereis.c:458:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char patbuf[PATH_MAX]; data/util-linux-2.36.1/misc-utils/wipefs.c:369:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp->magic, mag, *len); data/util-linux-2.36.1/misc-utils/wipefs.c:390:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(devname, mode | O_NONBLOCK); data/util-linux-2.36.1/misc-utils/wipefs.c:497:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(fname, O_CREAT | O_WRONLY, S_IRUSR | S_IWUSR); data/util-linux-2.36.1/misc-utils/wipefs.c:840:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(devname, O_RDONLY); data/util-linux-2.36.1/sys-utils/blkdiscard.c:223:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(path, O_RDWR | (force ? 0 : O_EXCL)); data/util-linux-2.36.1/sys-utils/blkzone.c:137:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(ctl->devname, mode); data/util-linux-2.36.1/sys-utils/chmem.c:106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *name, *onoff, line[BUFSIZ], str[BUFSIZ]; data/util-linux-2.36.1/sys-utils/chmem.c:180:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *name, *onoff, line[BUFSIZ], str[BUFSIZ]; data/util-linux-2.36.1/sys-utils/chmem.c:261:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[128]; data/util-linux-2.36.1/sys-utils/dmesg.c:166:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char levels[ARRAY_SIZE(level_names) / NBBY + 1]; data/util-linux-2.36.1/sys-utils/dmesg.c:167:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char facilities[ARRAY_SIZE(facility_names) / NBBY + 1]; data/util-linux-2.36.1/sys-utils/dmesg.c:181:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kmsg_buf[BUFSIZ];/* buffer to read kmsg data */ data/util-linux-2.36.1/sys-utils/dmesg.c:528:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(ctl->filename, O_RDONLY); data/util-linux-2.36.1/sys-utils/dmesg.c:900:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/util-linux-2.36.1/sys-utils/dmesg.c:901:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fpbuf[32] = "\0"; data/util-linux-2.36.1/sys-utils/dmesg.c:902:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tsbuf[64] = "\0"; data/util-linux-2.36.1/sys-utils/dmesg.c:1123:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ctl->kmsg = open("/dev/kmsg", mode); data/util-linux-2.36.1/sys-utils/eject.c:302:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX]; data/util-linux-2.36.1/sys-utils/eject.c:497:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(_PATH_PROC_CDROMINFO, "r"); data/util-linux-2.36.1/sys-utils/eject.c:504:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[512]; data/util-linux-2.36.1/sys-utils/eject.c:538:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return atoi(str); data/util-linux-2.36.1/sys-utils/eject.c:576:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char allowRmBlk[6] = {ALLOW_MEDIUM_REMOVAL, 0, 0, 0, 0, 0}; data/util-linux-2.36.1/sys-utils/eject.c:577:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char startStop1Blk[6] = {START_STOP, 0, 0, 0, 1, 0}; data/util-linux-2.36.1/sys-utils/eject.c:578:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char startStop2Blk[6] = {START_STOP, 0, 0, 0, 2, 0}; data/util-linux-2.36.1/sys-utils/eject.c:579:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char inqBuff[2]; data/util-linux-2.36.1/sys-utils/eject.c:580:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char sense_buffer[32]; data/util-linux-2.36.1/sys-utils/eject.c:694:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ctl->fd = open(ctl->device, O_RDWR | O_NONBLOCK | extra); data/util-linux-2.36.1/sys-utils/eject.c:696:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ctl->fd = open(ctl->device, O_RDONLY | O_NONBLOCK | extra); data/util-linux-2.36.1/sys-utils/eject.c:750:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char diskname[128]; data/util-linux-2.36.1/sys-utils/fallocate.c:402:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, O_RDWR | (!dig && !mode ? O_CREAT : 0), data/util-linux-2.36.1/sys-utils/flock.c:98:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, fl, 0666); data/util-linux-2.36.1/sys-utils/flock.c:105:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, fl); data/util-linux-2.36.1/sys-utils/fsfreeze.c:114:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(path, O_RDONLY); data/util-linux-2.36.1/sys-utils/fstrim.c:101:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(rpath, O_RDONLY); data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:1227:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const *yyarg[YYERROR_VERBOSE_ARGS_MAXIMUM]; data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:1421:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char yymsgbuf[128]; data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:2909:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[20]; data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:2990:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char * get_tz(char tzbuf[TZBUFSIZE]) data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:2990:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char * get_tz(char tzbuf[TZBUFSIZE]) data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:2996:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. ? memcpy (tzbuf, tz, tzsize) data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:3021:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tz0buf[TZBUFSIZE]; data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:3055:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tz1buf[TZBUFSIZE]; data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:3256:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tz1buf[sizeof "XXX+0:00" data/util-linux-2.36.1/sys-utils/hwclock-rtc.c:127:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). rtc_dev_fd = open(rtc_dev_name, O_RDONLY); data/util-linux-2.36.1/sys-utils/hwclock-rtc.c:132:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). rtc_dev_fd = open(fls[i], O_RDONLY); data/util-linux-2.36.1/sys-utils/hwclock.c:226:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line1[81]; /* String: first line of adjtime file */ data/util-linux-2.36.1/sys-utils/hwclock.c:227:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line2[81]; /* String: second line of adjtime file */ data/util-linux-2.36.1/sys-utils/hwclock.c:228:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line3[81]; /* String: third line of adjtime file */ data/util-linux-2.36.1/sys-utils/hwclock.c:233:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). adjfile = fopen(ctl->adj_file_name, "r"); /* open file for reading */ data/util-linux-2.36.1/sys-utils/hwclock.c:424:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[128 + 1]; data/util-linux-2.36.1/sys-utils/hwclock.c:630:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ISO_BUFSIZ]; data/util-linux-2.36.1/sys-utils/hwclock.c:900:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(ctl->adj_file_name, "w"); data/util-linux-2.36.1/sys-utils/ipcs.c:49:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[CTIME_BUFSIZ]; data/util-linux-2.36.1/sys-utils/ipcs.c:123:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). id = atoi (optarg); data/util-linux-2.36.1/sys-utils/ipcutils.c:51:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(_PATH_PROC_IPC_SEM, "r"); data/util-linux-2.36.1/sys-utils/ipcutils.c:104:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/sys-utils/ipcutils.c:111:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(_PATH_PROC_SYSV_SHM, "r"); data/util-linux-2.36.1/sys-utils/ipcutils.c:259:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(_PATH_PROC_SYSV_SEM, "r"); data/util-linux-2.36.1/sys-utils/ipcutils.c:367:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(_PATH_PROC_SYSV_MSG, "r"); data/util-linux-2.36.1/sys-utils/ipcutils.c:498:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[32]; data/util-linux-2.36.1/sys-utils/ipcutils.c:514:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(format, "%%%dju", width); data/util-linux-2.36.1/sys-utils/ipcutils.c:518:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(format, "%%%dju", width); data/util-linux-2.36.1/sys-utils/ipcutils.c:524:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(format, "%%%ds", width); data/util-linux-2.36.1/sys-utils/irq-common.c:212:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). irqfile = fopen(_PATH_PROC_INTERRUPTS, "r"); data/util-linux-2.36.1/sys-utils/irq-common.c:386:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result, stat->irq_info, size); data/util-linux-2.36.1/sys-utils/irqtop.c:103:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timestr[64], *data; data/util-linux-2.36.1/sys-utils/ldattach.c:390:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((tty_fd = open(dev, O_RDWR | O_NOCTTY)) < 0) data/util-linux-2.36.1/sys-utils/lscpu-arm.c:241:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. desc->vendor = (char *) hw_implementer[j].name; data/util-linux-2.36.1/sys-utils/lscpu-arm.c:251:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. desc->modelname = (char *) parts[j].name; data/util-linux-2.36.1/sys-utils/lscpu-arm.c:259:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8]; data/util-linux-2.36.1/sys-utils/lscpu-dmi.c:50:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(devmem, O_RDONLY)) < 0) data/util-linux-2.36.1/sys-utils/lscpu-dmi.c:202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuf[64]; data/util-linux-2.36.1/sys-utils/lscpu-dmi.c:211:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(tab = fopen("/sys/firmware/efi/systab", "r")) && data/util-linux-2.36.1/sys-utils/lscpu-dmi.c:212:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). !(tab = fopen("/proc/efi/systab", "r"))) data/util-linux-2.36.1/sys-utils/lscpu.c:429:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/sys-utils/lscpu.c:523:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/sys-utils/lscpu.c:721:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hyper_vendor_id[13]; data/util-linux-2.36.1/sys-utils/lscpu.c:726:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hyper_vendor_id + 0, &ebx, 4); data/util-linux-2.36.1/sys-utils/lscpu.c:727:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hyper_vendor_id + 4, &ecx, 4); data/util-linux-2.36.1/sys-utils/lscpu.c:728:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hyper_vendor_id + 8, &edx, 4); data/util-linux-2.36.1/sys-utils/lscpu.c:758:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/util-linux-2.36.1/sys-utils/lscpu.c:802:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/util-linux-2.36.1/sys-utils/lscpu.c:915:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/util-linux-2.36.1/sys-utils/lscpu.c:965:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/util-linux-2.36.1/sys-utils/lscpu.c:988:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/sys-utils/lscpu.c:1042:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/sys-utils/lscpu.c:1204:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mode[64]; data/util-linux-2.36.1/sys-utils/lscpu.c:1337:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/util-linux-2.36.1/sys-utils/lscpu.c:1808:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ], *data; data/util-linux-2.36.1/sys-utils/lscpu.c:1892:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/sys-utils/lscpu.c:1980:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char setbuf[setbuflen], *p; data/util-linux-2.36.1/sys-utils/lscpu.c:2023:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/sys-utils/lscpu.c:2049:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(p, "32-bit, "); data/util-linux-2.36.1/sys-utils/lscpu.c:2053:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(p, "64-bit, "); data/util-linux-2.36.1/sys-utils/lscpu.c:2126:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). threads_per_core = atoi(desc->mtid) + 1; data/util-linux-2.36.1/sys-utils/lsipc.c:446:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64] = {0}; data/util-linux-2.36.1/sys-utils/lsmem.c:281:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valid_zones[BUFSIZ]; data/util-linux-2.36.1/sys-utils/lsmem.c:449:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/util-linux-2.36.1/sys-utils/lsmem.c:481:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dir[PATH_MAX]; data/util-linux-2.36.1/sys-utils/lsns.c:257:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[16]; data/util-linux-2.36.1/sys-utils/lsns.c:323:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char req[NLMSG_SPACE(sizeof(struct rtgenmsg)) data/util-linux-2.36.1/sys-utils/lsns.c:347:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char res[NLMSG_SPACE(sizeof(struct rtgenmsg)) data/util-linux-2.36.1/sys-utils/lsns.c:427:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/sys-utils/mount.c:341:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ] = { 0 }; data/util-linux-2.36.1/sys-utils/mount.c:768:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX]; data/util-linux-2.36.1/sys-utils/mountpoint.c:67:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX], *cn; data/util-linux-2.36.1/sys-utils/nsenter.c:114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathbuf[PATH_MAX]; data/util-linux-2.36.1/sys-utils/nsenter.c:129:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). *fd = open(path, O_RDONLY); data/util-linux-2.36.1/sys-utils/nsenter.c:161:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX]; data/util-linux-2.36.1/sys-utils/nsenter.c:446:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). wd_fd = open(".", O_RDONLY); data/util-linux-2.36.1/sys-utils/readprofile.c:78:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return fopen(name, mode); data/util-linux-2.36.1/sys-utils/readprofile.c:140:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn_name[S_LEN], next_name[S_LEN]; /* current and next name */ data/util-linux-2.36.1/sys-utils/readprofile.c:141:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mode[8]; data/util-linux-2.36.1/sys-utils/readprofile.c:146:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapline[S_LEN]; data/util-linux-2.36.1/sys-utils/readprofile.c:235:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(defaultpro, O_WRONLY); data/util-linux-2.36.1/sys-utils/readprofile.c:245:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (((proFd = open(proFile, O_RDONLY)) < 0) data/util-linux-2.36.1/sys-utils/rfkill.c:190:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(_PATH_DEV_RFKILL, O_RDONLY); data/util-linux-2.36.1/sys-utils/rfkill.c:230:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char date_buf[ISO_BUFSIZ]; data/util-linux-2.36.1/sys-utils/rfkill.c:275:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name[128]; data/util-linux-2.36.1/sys-utils/rfkill.c:276:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX]; data/util-linux-2.36.1/sys-utils/rfkill.c:281:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(path, "r"); data/util-linux-2.36.1/sys-utils/rfkill.c:313:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[64]; data/util-linux-2.36.1/sys-utils/rfkill.c:551:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(_PATH_DEV_RFKILL, O_RDWR); data/util-linux-2.36.1/sys-utils/rtcwake.c:128:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128], *s; data/util-linux-2.36.1/sys-utils/rtcwake.c:135:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(buf, "r"); data/util-linux-2.36.1/sys-utils/rtcwake.c:198:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/util-linux-2.36.1/sys-utils/rtcwake.c:251:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256] = { 0 }; data/util-linux-2.36.1/sys-utils/rtcwake.c:254:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(SYS_POWER_STATE_PATH, O_RDONLY); data/util-linux-2.36.1/sys-utils/rtcwake.c:289:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *f = fopen(SYS_POWER_STATE_PATH, "w"); data/util-linux-2.36.1/sys-utils/rtcwake.c:310:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuf[ADJTIME_ZONE_BUFSIZ]; data/util-linux-2.36.1/sys-utils/rtcwake.c:312:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(ctl->adjfile, "r"); data/util-linux-2.36.1/sys-utils/rtcwake.c:342:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[CTIME_BUFSIZ]; data/util-linux-2.36.1/sys-utils/rtcwake.c:400:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(devpath, O_RDONLY | O_CLOEXEC); data/util-linux-2.36.1/sys-utils/rtcwake.c:562:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[CTIME_BUFSIZ]; data/util-linux-2.36.1/sys-utils/rtcwake.c:575:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[CTIME_BUFSIZ]; data/util-linux-2.36.1/sys-utils/rtcwake.c:581:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[CTIME_BUFSIZ]; data/util-linux-2.36.1/sys-utils/rtcwake.c:599:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *arg[5]; data/util-linux-2.36.1/sys-utils/setpriv.c:253:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4097]; data/util-linux-2.36.1/sys-utils/setpriv.c:257:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(_PATH_PROC_ATTR_CURRENT, O_RDONLY); data/util-linux-2.36.1/sys-utils/setpriv.c:625:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(_PATH_PROC_ATTR_EXEC, O_RDWR); data/util-linux-2.36.1/sys-utils/setpriv.c:648:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(_PATH_PROC_ATTR_EXEC, "r+"); data/util-linux-2.36.1/sys-utils/setpriv.c:732:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. rv = memcpy(dst, src, sizeof(*dst)); data/util-linux-2.36.1/sys-utils/swapon.c:309:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const *cmd[7]; data/util-linux-2.36.1/sys-utils/swapon.c:372:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(dev->path, O_WRONLY); data/util-linux-2.36.1/sys-utils/swapon.c:490:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[UUID_STR_LEN]; data/util-linux-2.36.1/sys-utils/swapon.c:515:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(dev->path, O_RDONLY); data/util-linux-2.36.1/sys-utils/swapon.c:718:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). props->priority = atoi(arg); data/util-linux-2.36.1/sys-utils/switch_root.c:142:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newmount[PATH_MAX]; data/util-linux-2.36.1/sys-utils/switch_root.c:165:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). cfd = open("/", O_RDONLY); data/util-linux-2.36.1/sys-utils/tunelp.c:246:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, O_WRONLY | O_NONBLOCK, 0); data/util-linux-2.36.1/sys-utils/umount.c:156:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ] = { 0 }; data/util-linux-2.36.1/sys-utils/umount.c:561:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX]; data/util-linux-2.36.1/sys-utils/unshare.c:108:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(file, O_WRONLY); data/util-linux-2.36.1/sys-utils/unshare.c:125:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(file, O_WRONLY); data/util-linux-2.36.1/sys-utils/unshare.c:185:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src[PATH_MAX]; data/util-linux-2.36.1/sys-utils/unshare.c:203:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX]; data/util-linux-2.36.1/sys-utils/unshare.c:214:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[sizeof(stringify_value(ULONG_MAX)) * 3]; data/util-linux-2.36.1/sys-utils/unshare.c:219:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("/proc/self/timens_offsets", O_WRONLY); data/util-linux-2.36.1/sys-utils/wdctl.c:355:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(wd->devpath, O_WRONLY|O_CLOEXEC); data/util-linux-2.36.1/sys-utils/wdctl.c:411:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(wd->devpath, O_WRONLY|O_CLOEXEC); data/util-linux-2.36.1/sys-utils/zramctl.c:113:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char devname[32]; data/util-linux-2.36.1/sys-utils/zramctl.c:447:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX] = { '\0' }; data/util-linux-2.36.1/term-utils/agetty.c:375:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *login_argv[LOGIN_ARGV_MAX + 1]; data/util-linux-2.36.1/term-utils/agetty.c:393:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dbf = fopen(DEBUG_OUTPUT, "w"); data/util-linux-2.36.1/term-utils/agetty.c:601:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tp, str, p - str); data/util-linux-2.36.1/term-utils/agetty.c:606:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tp, username, usz); data/util-linux-2.36.1/term-utils/agetty.c:611:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tp, p + 2, sz - (p - str) - 1); data/util-linux-2.36.1/term-utils/agetty.c:1036:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX+1]; data/util-linux-2.36.1/term-utils/agetty.c:1052:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(buf, O_RDWR|O_NOCTTY|O_NONBLOCK, 0)) < 0) data/util-linux-2.36.1/term-utils/agetty.c:1105:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (open(buf, O_RDWR|O_NOCTTY|O_NONBLOCK, 0) != 0) data/util-linux-2.36.1/term-utils/agetty.c:1418:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/term-utils/agetty.c:1520:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(_PATH_OS_RELEASE_ETC, O_RDONLY); data/util-linux-2.36.1/term-utils/agetty.c:1522:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(_PATH_OS_RELEASE_USR, O_RDONLY); data/util-linux-2.36.1/term-utils/agetty.c:1619:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; data/util-linux-2.36.1/term-utils/agetty.c:1673:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[sizeof(struct inotify_event) + NAME_MAX + 1]; data/util-linux-2.36.1/term-utils/agetty.c:1678:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int reload_fd = open(AGETTY_RELOAD_FILENAME, data/util-linux-2.36.1/term-utils/agetty.c:1766:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dd = open(dirname, O_RDONLY|O_CLOEXEC|O_DIRECTORY); data/util-linux-2.36.1/term-utils/agetty.c:1859:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *f = fopen(filename, "r" UL_CLOEXECSTR); data/util-linux-2.36.1/term-utils/agetty.c:2053:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hint[256] = { '\0' }; data/util-linux-2.36.1/term-utils/agetty.c:2136:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char logname[BUFSIZ]; data/util-linux-2.36.1/term-utils/agetty.c:2423:15: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). long speed = atol(s); data/util-linux-2.36.1/term-utils/agetty.c:2517:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/term-utils/agetty.c:2518:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char new_fmt[BUFSIZ]; data/util-linux-2.36.1/term-utils/agetty.c:2526:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open("/dev/console", 1)) >= 0) { data/util-linux-2.36.1/term-utils/agetty.c:2562:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[INET6_ADDRSTRLEN + 1]; data/util-linux-2.36.1/term-utils/agetty.c:2686:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char escname[UL_COLORNAME_MAXSZ]; data/util-linux-2.36.1/term-utils/agetty.c:2832:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iface[128]; data/util-linux-2.36.1/term-utils/agetty.c:2924:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, sep, ssz); data/util-linux-2.36.1/term-utils/agetty.c:2927:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, src, sz); data/util-linux-2.36.1/term-utils/agetty.c:2958:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(AGETTY_RELOAD_FILENAME, O_CREAT|O_CLOEXEC|O_WRONLY, data/util-linux-2.36.1/term-utils/mesg.c:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ttybuf[sizeof(_PATH_PROC_FDDIR) + sizeof(stringify_value(INT_MAX))]; data/util-linux-2.36.1/term-utils/mesg.c:142:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(tty, O_RDONLY)) < 0) data/util-linux-2.36.1/term-utils/script-playutils.c:190:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). stp->timing_fp = fopen(filename, "r"); data/util-linux-2.36.1/term-utils/script-playutils.c:250:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "r"); data/util-linux-2.36.1/term-utils/script-playutils.c:321:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/term-utils/script-playutils.c:496:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/term-utils/script.c:291:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[FORMAT_TIMESTAMP_MAX]; data/util-linux-2.36.1/term-utils/script.c:377:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). log->fp = fopen(log->filename, data/util-linux-2.36.1/term-utils/script.c:390:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[FORMAT_TIMESTAMP_MAX]; data/util-linux-2.36.1/term-utils/script.c:525:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[BUFSIZ] = {0}; data/util-linux-2.36.1/term-utils/script.c:566:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[BUFSIZ] = {0}; data/util-linux-2.36.1/term-utils/script.c:1002:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[FORMAT_TIMESTAMP_MAX]; data/util-linux-2.36.1/term-utils/scriptreplay.c:131:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char streams[6] = {0}; /* IOSI - in, out, signal,info */ data/util-linux-2.36.1/term-utils/setterm.c:744:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(ctl->in_device, O_RDONLY); data/util-linux-2.36.1/term-utils/setterm.c:785:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char header[4]; data/util-linux-2.36.1/term-utils/setterm.c:797:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(ctl->opt_sn_name, ctl->opt_snap ? "w" : "a"); data/util-linux-2.36.1/term-utils/setterm.c:852:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tattr, saved_attributes, sizeof(struct termios)); data/util-linux-2.36.1/term-utils/setterm.c:895:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char retstr[32]; data/util-linux-2.36.1/term-utils/setterm.c:1114:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ioctlarg[2]; data/util-linux-2.36.1/term-utils/ttymsg.c:72:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char device[MAXNAMLEN]; data/util-linux-2.36.1/term-utils/ttymsg.c:73:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char errbuf[ERR_BUFLEN]; data/util-linux-2.36.1/term-utils/ttymsg.c:102:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(device, O_WRONLY|O_NONBLOCK, 0)) < 0) { data/util-linux-2.36.1/term-utils/wall.c:186:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[sizeof(utmpptr->ut_line) + 1]; data/util-linux-2.36.1/term-utils/wall.c:295:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bs->data + bs->used, s, len + 1); data/util-linux-2.36.1/term-utils/wall.c:353:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *whom, *where, date[CTIME_BUFSIZ]; data/util-linux-2.36.1/term-utils/write.c:166:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[sizeof(u->ut_line) + 6]; data/util-linux-2.36.1/term-utils/write.c:250:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *host, line[512]; data/util-linux-2.36.1/tests/helpers/test_md5.c:11:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[UL_MD5LENGTH]; data/util-linux-2.36.1/tests/helpers/test_md5.c:12:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[BUFSIZ]; data/util-linux-2.36.1/tests/helpers/test_sha1.c:11:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[UL_SHA1LENGTH]; data/util-linux-2.36.1/tests/helpers/test_sha1.c:12:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[BUFSIZ]; data/util-linux-2.36.1/tests/helpers/test_uuid_namespace.c:10:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[UUID_STR_LEN]; data/util-linux-2.36.1/tests/helpers/test_uuid_namespace.c:14:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf, "NULL"); data/util-linux-2.36.1/text-utils/colcrt.c:70:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t line[OUTPUT_COLS + 1]; data/util-linux-2.36.1/text-utils/colcrt.c:71:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t line_under[OUTPUT_COLS + 1]; data/util-linux-2.36.1/text-utils/colcrt.c:283:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(ctl.f = fopen(*argv, "r"))) data/util-linux-2.36.1/text-utils/column.c:823:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(*argv, "r")) != NULL) { data/util-linux-2.36.1/text-utils/hexdump-display.c:92:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&val, bp + offt - address, clr->range); data/util-linux-2.36.1/text-utils/hexdump-parse.c:83:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(name, "r")) == NULL) data/util-linux-2.36.1/text-utils/hexdump-parse.c:136:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tfu->reps = atoi(savep); data/util-linux-2.36.1/text-utils/hexdump-parse.c:153:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tfu->bcnt = atoi(savep); data/util-linux-2.36.1/text-utils/hexdump-parse.c:203:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). prec = atoi(fmt); data/util-linux-2.36.1/text-utils/hexdump-parse.c:229:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char savech, cs[4]; data/util-linux-2.36.1/text-utils/hexdump-parse.c:272:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). prec = atoi(p1); data/util-linux-2.36.1/text-utils/hexdump-parse.c:575:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hc, hcnext, sizeof(struct hexdump_clr)); data/util-linux-2.36.1/text-utils/more.c:421:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. signed char twobytes[2]; data/util-linux-2.36.1/text-utils/more.c:456:28: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (((ctl->current_file = fopen(fs, "r")) == NULL) || data/util-linux-2.36.1/text-utils/more.c:511:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mbc[MB_LEN_MAX]; /* Buffer for one multibyte char. */ data/util-linux-2.36.1/text-utils/more.c:1226:4: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). open("/dev/tty", 0); data/util-linux-2.36.1/text-utils/more.c:1279:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdbuf[COMMAND_BUF]; data/util-linux-2.36.1/text-utils/more.c:1411:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[REGERR_BUF]; data/util-linux-2.36.1/text-utils/more.c:1536:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cmdbuf, "-c %d", n); data/util-linux-2.36.1/text-utils/more.c:1539:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cmdbuf, "+%d", n); data/util-linux-2.36.1/text-utils/more.c:1607:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdbuf[INIT_BUF]; data/util-linux-2.36.1/text-utils/more.c:1858:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/util-linux-2.36.1/text-utils/pg.c:108:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdline[CMDBUF]; data/util-linux-2.36.1/text-utils/pg.c:112:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pattern[CMDBUF]; data/util-linux-2.36.1/text-utils/pg.c:149:8: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t wbuf[READBUF]; /* used in several widechar routines */ data/util-linux-2.36.1/text-utils/pg.c:324:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((envlines = atoi(p)) < 0) data/util-linux-2.36.1/text-utils/pg.c:327:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((envcols = atoi(p)) < 0) data/util-linux-2.36.1/text-utils/pg.c:603:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi(buf + 1); data/util-linux-2.36.1/text-utils/pg.c:605:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi(buf); data/util-linux-2.36.1/text-utils/pg.c:619:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[LINE_MAX], *p; data/util-linux-2.36.1/text-utils/pg.c:626:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(b + (p - pstring), "%lld", pageno); data/util-linux-2.36.1/text-utils/pg.c:924:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[READBUF + 1]; data/util-linux-2.36.1/text-utils/pg.c:942:10: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). fbuf = tmpfile(); data/util-linux-2.36.1/text-utils/pg.c:947:9: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). find = tmpfile(); data/util-linux-2.36.1/text-utils/pg.c:1211:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). save = fopen(p, "wb"); data/util-linux-2.36.1/text-utils/pg.c:1377:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). open(tty, O_RDONLY); data/util-linux-2.36.1/text-utils/pg.c:1518:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). input = fopen(argv[arg], "r"); data/util-linux-2.36.1/text-utils/rev.c:139:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(*argv, "r")) == NULL) { data/util-linux-2.36.1/text-utils/ul.c:228:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(argv[optind],"r"); data/util-linux-2.36.1/disk-utils/blockdev.c:208:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (int)(24 - strlen(bdcms[i].name)), data/util-linux-2.36.1/disk-utils/cfdisk.c:513:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cf->linesbufsz = strlen(cf->linesbuf); data/util-linux-2.36.1/disk-utils/cfdisk.c:1452:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tbstr += strlen(tbstr) + 1; data/util-linux-2.36.1/disk-utils/cfdisk.c:1859:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rc = strlen(edit->buf); /* success */ data/util-linux-2.36.1/disk-utils/cfdisk.c:1906:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(buf); data/util-linux-2.36.1/disk-utils/fdformat.c:97:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read_bytes = read(ctrl, data, track_size); data/util-linux-2.36.1/disk-utils/fdisk-list.c:455:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(name) + 1; data/util-linux-2.36.1/disk-utils/fdisk.c:141:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(reply_line); data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:173:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, &super, sizeof(super)) != sizeof(super)) data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:180:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, &super, sizeof(super)) != sizeof(super)) data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:235:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). tmp = read(fd, buf, super.size); data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:256:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). retval = read(fd, buf, 4096); data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:309:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). x = read(fd, read_buffer, ROMBUFFERSIZE * 2); data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:442:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int pathlen = strlen(path); data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:481:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((pathlen + newlen) - strlen(newpath) > 3) data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:623:2: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(0); data/util-linux-2.36.1/disk-utils/fsck.minix.c:366:33: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). } else if (MINIX_BLOCK_SIZE != read(device_fd, addr, MINIX_BLOCK_SIZE)) { data/util-linux-2.36.1/disk-utils/fsck.minix.c:564:26: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (MINIX_BLOCK_SIZE != read(device_fd, super_block_buffer, MINIX_BLOCK_SIZE)) data/util-linux-2.36.1/disk-utils/fsck.minix.c:628:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rc = read(device_fd, inode_map, imaps * MINIX_BLOCK_SIZE); data/util-linux-2.36.1/disk-utils/fsck.minix.c:632:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rc = read(device_fd, zone_map, zmaps * MINIX_BLOCK_SIZE); data/util-linux-2.36.1/disk-utils/fsck.minix.c:636:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rc = read(device_fd, inode_buffer, buffsz); data/util-linux-2.36.1/disk-utils/fsck.minix.c:1135:30: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return (MINIX_BLOCK_SIZE != read(device_fd, buffer, MINIX_BLOCK_SIZE)); data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:143:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optarg); data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:150:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(optarg); data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:220:6: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. int equal; data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:233:9: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. return equal; data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:293:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name); data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:328:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namelen = strlen(dirent->d_name); data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:466:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen((const char *)entry->name); data/util-linux-2.36.1/disk-utils/mkfs.minix.c:412:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(tmp + 4, "."); data/util-linux-2.36.1/disk-utils/mkfs.minix.c:421:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(tmp + 2, "."); data/util-linux-2.36.1/disk-utils/mkfs.minix.c:588:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). got = read(ctl->device_fd, buffer, try * MINIX_BLOCK_SIZE); data/util-linux-2.36.1/disk-utils/mkswap.c:124:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(ctl->opt_label) > strlen(ctl->hdr->volume_name)) data/util-linux-2.36.1/disk-utils/mkswap.c:124:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(ctl->opt_label) > strlen(ctl->hdr->volume_name)) data/util-linux-2.36.1/disk-utils/mkswap.c:202:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rc = read(ctl->fd, buffer, ctl->pagesize); data/util-linux-2.36.1/disk-utils/partx.c:194:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(partition); data/util-linux-2.36.1/disk-utils/partx.c:248:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(parent, d->d_name, strlen(parent)) != 0) data/util-linux-2.36.1/disk-utils/sfdisk.c:159:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(buf); data/util-linux-2.36.1/disk-utils/sfdisk.c:1590:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(p); data/util-linux-2.36.1/disk-utils/swaplabel.c:99:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(label) > strlen(newlabel)) data/util-linux-2.36.1/disk-utils/swaplabel.c:99:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(label) > strlen(newlabel)) data/util-linux-2.36.1/include/all-io.h:65:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ret = read(fd, buf, count); data/util-linux-2.36.1/include/c.h:192:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(prog_inv_sh_nm_buf, t, sizeof(prog_inv_sh_nm_buf) - 1); data/util-linux-2.36.1/include/c.h:339:9: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. return usleep(usec); data/util-linux-2.36.1/include/mangle.h:18:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unmangle_to_buffer(s, s, strlen(s) + 1); data/util-linux-2.36.1/include/mangle.h:24:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unhexmangle_to_buffer(s, s, strlen(s) + 1); data/util-linux-2.36.1/include/strutils.h:64:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dest, src, n-1); data/util-linux-2.36.1/include/strutils.h:77:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t bytes = strlen(src) + 1; data/util-linux-2.36.1/include/strutils.h:109:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). osz = strlen(str); data/util-linux-2.36.1/include/strutils.h:110:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nsz = strlen(newstr); data/util-linux-2.36.1/include/strutils.h:208:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sz = prefix ? strlen(prefix) : 0; data/util-linux-2.36.1/include/strutils.h:220:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sz = prefix ? strlen(prefix) : 0; data/util-linux-2.36.1/include/strutils.h:232:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sl = s ? strlen(s) : 0; data/util-linux-2.36.1/include/strutils.h:233:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t pl = postfix ? strlen(postfix) : 0; data/util-linux-2.36.1/include/strutils.h:273:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen((char *) str); data/util-linux-2.36.1/include/strutils.h:298:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((char *) p); data/util-linux-2.36.1/include/widechar.h:21:17: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). # define fgetwc fgetc data/util-linux-2.36.1/include/widechar.h:22:16: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). # define getwc getc data/util-linux-2.36.1/include/widechar.h:23:19: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). # define getwchar getchar data/util-linux-2.36.1/include/widechar.h:40:10: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). # define wcslen strlen data/util-linux-2.36.1/include/widechar.h:40:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). # define wcslen strlen data/util-linux-2.36.1/lib/blkdev.c:42:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read (fd, &ch, 1) < 1) data/util-linux-2.36.1/lib/canonicalize.c:46:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (fgets(name, sizeof(name), f) && (sz = strlen(name)) > 1) { data/util-linux-2.36.1/lib/canonicalize.c:106:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). csz = strlen(cwd); data/util-linux-2.36.1/lib/canonicalize.c:107:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). psz = strlen(path); data/util-linux-2.36.1/lib/canonicalize.c:189:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = canonical ? (ssize_t) strlen(canonical) : data/util-linux-2.36.1/lib/colors.c:200:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!str || !*str || *str == '.' || strlen(str) > PATH_MAX) data/util-linux-2.36.1/lib/colors.c:261:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namesz = strlen(cc->utilname); data/util-linux-2.36.1/lib/colors.c:262:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). termsz = cc->termname ? strlen(cc->termname) : 0; data/util-linux-2.36.1/lib/colors.c:314:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(sfile, d->d_name, sizeof(sfile)); data/util-linux-2.36.1/lib/cpuset.c:228:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(str); data/util-linux-2.36.1/lib/env.c:65:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(*cur, *bad, strlen(*bad)) == 0) { data/util-linux-2.36.1/lib/env.c:75:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(*cur, *bad, strlen(*bad)) != 0) data/util-linux-2.36.1/lib/exec_shell.c:45:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). arg0 = xmalloc(strlen(shell_basename) + 2); data/util-linux-2.36.1/lib/fileutils.c:66:13: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). old_mode = umask(077); data/util-linux-2.36.1/lib/fileutils.c:68:2: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(old_mode); data/util-linux-2.36.1/lib/idcache.c:69:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). w = strlen(name); data/util-linux-2.36.1/lib/idcache.c:94:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). w = ent->name ? strlen(ent->name) : 0; data/util-linux-2.36.1/lib/loopdev.c:112:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(device) < 5) data/util-linux-2.36.1/lib/mangle.c:31:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ss = sp = malloc(4 * strlen(s) + 1); data/util-linux-2.36.1/lib/mangle.c:160:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unmangle_to_buffer(x, x, strlen(x) + 1); data/util-linux-2.36.1/lib/match.c:39:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(type); data/util-linux-2.36.1/lib/mbsalign.c:90:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return mbs_nwidth(s, strlen(s)); data/util-linux-2.36.1/lib/mbsalign.c:162:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return mbs_safe_nwidth(s, strlen(s), NULL); data/util-linux-2.36.1/lib/mbsalign.c:177:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sz = s ? strlen(s) : 0; data/util-linux-2.36.1/lib/mbsalign.c:266:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sz = s ? strlen(s) : 0; data/util-linux-2.36.1/lib/mbsalign.c:330:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sz = s ? strlen(s) : 0; data/util-linux-2.36.1/lib/mbsalign.c:349:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sz = s ? strlen(s) : 0; data/util-linux-2.36.1/lib/mbsalign.c:434:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssize_t bytes = strlen(str); data/util-linux-2.36.1/lib/mbsalign.c:506:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t src_size = strlen (src) + 1; data/util-linux-2.36.1/lib/mbsedit.c:27:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). edit->cur_bytes = strlen(buf); data/util-linux-2.36.1/lib/mbsedit.c:142:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bytes = strlen(str); data/util-linux-2.36.1/lib/mbsedit.c:169:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bytes = strlen(str); data/util-linux-2.36.1/lib/path.c:857:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rc = write_all(fd, str, strlen(str)); data/util-linux-2.36.1/lib/path.c:1000:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/util-linux-2.36.1/lib/plymouth-ctrl.c:87:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). offsetof(struct sockaddr_un, sun_path) + 1 + strlen(su.sun_path+1)); data/util-linux-2.36.1/lib/pty-session.c:348:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). bytes = read(fd, buf, sizeof(buf)); data/util-linux-2.36.1/lib/pty-session.c:433:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). bytes = read(fd, &info, sizeof(info)); data/util-linux-2.36.1/lib/randutils.c:145:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ssize_t x = read(fd, cp, n); data/util-linux-2.36.1/lib/setproctitle.c:46:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). argv_lth = envp[i-1] + strlen(envp[i-1]) - argv[0]; data/util-linux-2.36.1/lib/setproctitle.c:48:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). argv_lth = argv[argc-1] + strlen(argv[argc-1]) - argv[0]; data/util-linux-2.36.1/lib/setproctitle.c:61:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(prog) + strlen(txt) + 5 > SPT_BUFSIZE) data/util-linux-2.36.1/lib/setproctitle.c:61:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(prog) + strlen(txt) + 5 > SPT_BUFSIZE) data/util-linux-2.36.1/lib/setproctitle.c:66:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(buf); data/util-linux-2.36.1/lib/strutils.c:121:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t dpsz = dp ? strlen(dp) : 0; data/util-linux-2.36.1/lib/strutils.c:934:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). a = strlen(s); data/util-linux-2.36.1/lib/strutils.c:951:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strnappend(s, suffix, suffix ? strlen(suffix) : 0); data/util-linux-2.36.1/lib/strutils.c:1041:13: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((ch = fgetc(fp)) == EOF) data/util-linux-2.36.1/lib/strv.c:226:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). k = strlen(separator); data/util-linux-2.36.1/lib/strv.c:232:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n += strlen(*s); data/util-linux-2.36.1/lib/sysfs.c:195:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(name); data/util-linux-2.36.1/lib/sysfs.c:226:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(p); data/util-linux-2.36.1/lib/sysfs.c:227:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(d->d_name) <= len) data/util-linux-2.36.1/lib/sysfs.c:350:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(chain); data/util-linux-2.36.1/lib/sysfs.c:399:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). psz = strlen(prefix); data/util-linux-2.36.1/lib/sysfs.c:966:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(name); data/util-linux-2.36.1/lib/timeutils.c:133:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = e + strlen(table[i].suffix); data/util-linux-2.36.1/lib/timeutils.c:238:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). z = strndup(t, strlen(t) - 4); data/util-linux-2.36.1/lib/timeutils.c:256:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). skip = strlen(day_nr[i].name); data/util-linux-2.36.1/libblkid/src/dev.c:158:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new_type = malloc(strlen(search_type)+1); data/util-linux-2.36.1/libblkid/src/dev.c:159:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new_value = malloc(strlen(search_value)+1); data/util-linux-2.36.1/libblkid/src/devname.c:164:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(de->d_name) > sizeof(path)-32) data/util-linux-2.36.1/libblkid/src/devname.c:310:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int vg_len = strlen(VG_DIR); data/util-linux-2.36.1/libblkid/src/devname.c:327:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vdirname = malloc(vg_len + strlen(vg_name) + 8); data/util-linux-2.36.1/libblkid/src/devname.c:344:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lvm_device = malloc(vg_len + strlen(vg_name) + data/util-linux-2.36.1/libblkid/src/devname.c:345:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(lv_name) + 8); data/util-linux-2.36.1/libblkid/src/devname.c:504:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lens[which] = strlen(ptname); data/util-linux-2.36.1/libblkid/src/devno.c:44:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). al = a ? strlen(a) : 0; data/util-linux-2.36.1/libblkid/src/devno.c:45:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bl = b ? strlen(b) : 0; data/util-linux-2.36.1/libblkid/src/devno.c:46:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cl = c ? strlen(c) : 0; data/util-linux-2.36.1/libblkid/src/evaluate.c:162:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(dev); data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:628:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(name) + 1); data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:762:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (const unsigned char *) v, strlen(v) + 1); data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:768:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (const unsigned char *) v, strlen(v) + 1); data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:773:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (const unsigned char *) v, strlen(v) + 1); data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:779:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (const unsigned char *) v, strlen(v) + 1); data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:1153:66: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!blkid_probe_set_value(pr, "PTUUID", (unsigned char *) str, strlen(str) + 1)) data/util-linux-2.36.1/libblkid/src/probe.c:564:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ret = read(pr->fd, bf->data, len); data/util-linux-2.36.1/libblkid/src/probe.c:802:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). sz = read(fd, buf, sizeof(buf)); data/util-linux-2.36.1/libblkid/src/read.c:84:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = line + strlen(line) - 1; data/util-linux-2.36.1/libblkid/src/read.c:311:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ret = blkid_set_tag(dev, name, value, strlen(value)); data/util-linux-2.36.1/libblkid/src/read.c:399:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). end = strlen(buf) - 1; data/util-linux-2.36.1/libblkid/src/read.c:403:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). end = strlen(buf) - 1; data/util-linux-2.36.1/libblkid/src/save.c:131:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmp = malloc(strlen(filename) + 8); data/util-linux-2.36.1/libblkid/src/save.c:182:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). backup = malloc(strlen(filename) + 5); data/util-linux-2.36.1/libblkid/src/superblocks/befs.c:326:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(key), all_key_length, fs_le); data/util-linux-2.36.1/libblkid/src/superblocks/befs.c:343:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key, strlen(key), data/util-linux-2.36.1/libblkid/src/superblocks/befs.c:404:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && FS16_TO_CPU(sd->name_size, fs_le) == strlen(KEY_NAME) data/util-linux-2.36.1/libblkid/src/superblocks/superblocks.c:425:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(id->name) + 1); data/util-linux-2.36.1/libblkid/src/superblocks/superblocks.c:539:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(version) + 1); data/util-linux-2.36.1/libblkid/src/superblocks/superblocks.c:583:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return blkid_probe_set_value(pr, "USAGE", (unsigned char *) u, strlen(u) + 1); data/util-linux-2.36.1/libblkid/src/superblocks/superblocks.c:743:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((const char *) str); data/util-linux-2.36.1/libfdisk/src/dos.c:251:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(cxt->dev_fd, buf, cxt->sector_size); data/util-linux-2.36.1/libfdisk/src/dos.c:1258:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). && read) { data/util-linux-2.36.1/libfdisk/src/dos.c:1267:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (!read && start == temp) { data/util-linux-2.36.1/libfdisk/src/dos.c:1297:29: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). } while (start != temp || !read); data/util-linux-2.36.1/libfdisk/src/gpt.c:975:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return (size_t)read(cxt->dev_fd, buffer, bytes) != bytes; data/util-linux-2.36.1/libfdisk/src/gpt.c:1010:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ssz = read(cxt->dev_fd, ret, sz); data/util-linux-2.36.1/libfdisk/src/sgi.c:390:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(name); data/util-linux-2.36.1/libfdisk/src/sgi.c:454:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(name); data/util-linux-2.36.1/libfdisk/src/utils.c:32:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(cxt->dev_fd, buf, size); data/util-linux-2.36.1/libfdisk/src/utils.c:135:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). w = strlen(dev); data/util-linux-2.36.1/libmount/python/fs.c:84:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (len = strlen(s); len > _PY_MAX_LEN; len -= _PY_MAX_LEN, s += _PY_MAX_LEN) data/util-linux-2.36.1/libmount/src/cache.c:224:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tksz = strlen(tagname); data/util-linux-2.36.1/libmount/src/cache.c:225:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vlsz = strlen(tagval); data/util-linux-2.36.1/libmount/src/cache.c:275:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tksz = strlen(token); data/util-linux-2.36.1/libmount/src/cache.c:303:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return e->key + strlen(token) + 1; /* tag value */ data/util-linux-2.36.1/libmount/src/cache.c:740:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sz = strlen(line); data/util-linux-2.36.1/libmount/src/cache.c:763:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sz = strlen(line); data/util-linux-2.36.1/libmount/src/cache.c:787:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sz = strlen(line); data/util-linux-2.36.1/libmount/src/cache.c:821:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). e->key + strlen(e->key) + 1); data/util-linux-2.36.1/libmount/src/context.c:3437:2: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(S_IWGRP|S_IWOTH); /* to be compatible with mount(8) */ data/util-linux-2.36.1/libmount/src/context_veritydev.c:46:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(hex); data/util-linux-2.36.1/libmount/src/context_veritydev.c:122:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mapper_device = calloc(strlen(backing_file_basename) + strlen("libmnt_") + 1, sizeof(char)); data/util-linux-2.36.1/libmount/src/context_veritydev.c:122:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mapper_device = calloc(strlen(backing_file_basename) + strlen("libmnt_") + 1, sizeof(char)); data/util-linux-2.36.1/libmount/src/context_veritydev.c:371:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mapper_device_full = calloc(strlen(mapper_device) + strlen("/dev/mapper/") + 1, sizeof(char)); data/util-linux-2.36.1/libmount/src/context_veritydev.c:371:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mapper_device_full = calloc(strlen(mapper_device) + strlen("/dev/mapper/") + 1, sizeof(char)); data/util-linux-2.36.1/libmount/src/context_veritydev.c:509:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strncmp(src, "/dev/mapper/libmnt_", strlen("/dev/mapper/libmnt_"))) { data/util-linux-2.36.1/libmount/src/fs.c:147:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(src) + 1; data/util-linux-2.36.1/libmount/src/fs.c:726:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(vfs) + strlen(fs) + 5; data/util-linux-2.36.1/libmount/src/fs.c:726:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(vfs) + strlen(fs) + 5; data/util-linux-2.36.1/libmount/src/fs.c:745:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(p)) data/util-linux-2.36.1/libmount/src/lock.c:69:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). losz = strlen(datafile) + sizeof(".lock"); data/util-linux-2.36.1/libmount/src/lock.c:148:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(ml->lockfile); data/util-linux-2.36.1/libmount/src/monitor.c:328:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). len = read(me->fd, buf, sizeof(buf)); data/util-linux-2.36.1/libmount/src/optstr.c:137:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namesz = strlen(name); data/util-linux-2.36.1/libmount/src/optstr.c:189:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). osz = *optstr ? strlen(*optstr) : 0; data/util-linux-2.36.1/libmount/src/optstr.c:238:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nsz = strlen(name); data/util-linux-2.36.1/libmount/src/optstr.c:239:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vsz = value ? strlen(value) : 0; data/util-linux-2.36.1/libmount/src/optstr.c:341:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t shift = strlen(*optstr); data/util-linux-2.36.1/libmount/src/optstr.c:346:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). shift -= strlen(*optstr); data/util-linux-2.36.1/libmount/src/optstr.c:375:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(end); data/util-linux-2.36.1/libmount/src/optstr.c:388:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t subsz = strlen(substr); /* substring size */ data/util-linux-2.36.1/libmount/src/optstr.c:389:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t strsz = strlen(*str); data/util-linux-2.36.1/libmount/src/optstr.c:390:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t possz = strlen(pos); data/util-linux-2.36.1/libmount/src/optstr.c:468:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (value && ol.value && strlen(value) == ol.valsz) data/util-linux-2.36.1/libmount/src/optstr.c:922:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen((char *) raw); data/util-linux-2.36.1/libmount/src/optstr.c:1135:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf = malloc(strlen(pattern) + 1); data/util-linux-2.36.1/libmount/src/tab.c:1269:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t optvalsz = 0, valsz = val ? strlen(val) : 0; data/util-linux-2.36.1/libmount/src/tab.c:1403:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(mnt); data/util-linux-2.36.1/libmount/src/tab_parse.c:476:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sz = str ? strlen(str) : 0; data/util-linux-2.36.1/libmount/src/tab_parse.c:890:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namesz = strlen(d->d_name); data/util-linux-2.36.1/libmount/src/utils.c:50:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). al = strlen(*a); data/util-linux-2.36.1/libmount/src/utils.c:51:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bl = strlen(b); data/util-linux-2.36.1/libmount/src/utils.c:202:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(*filename, last, strlen(last) + 1); data/util-linux-2.36.1/libmount/src/utils.c:929:12: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). oldmode = umask(S_IRGRP|S_IWGRP|S_IXGRP| data/util-linux-2.36.1/libmount/src/utils.c:934:2: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(oldmode); data/util-linux-2.36.1/libmount/src/utils.c:1050:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/util-linux-2.36.1/libmount/src/utils.c:1054:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(name); data/util-linux-2.36.1/libmount/src/utils.c:1216:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ret = read(fd, bufptr, bufmax - *bufsiz); data/util-linux-2.36.1/libsmartcols/src/buffer.c:60:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(str); data/util-linux-2.36.1/libsmartcols/src/print.c:510:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bytes = strlen(data); data/util-linux-2.36.1/libsmartcols/src/print.c:719:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = bufsz = strlen(tb->title.data) + 1; data/util-linux-2.36.1/libsmartcols/src/print.c:726:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bufsz = mbs_safe_encode_size(strlen(tb->title.data)) + 1; data/util-linux-2.36.1/libsmartcols/src/print.c:964:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz += data ? strlen(data) : 0; data/util-linux-2.36.1/libsmartcols/src/print.c:1025:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extra_bufsz += tb->nlines * strlen(vertical_symbol(tb)); data/util-linux-2.36.1/libsmartcols/src/print.c:1044:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extra_bufsz += strlen(scols_cell_get_data(&cl->header)); /* data */ data/util-linux-2.36.1/libuuid/src/gen_uuid.c:171:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(ifr.ifr_name, ifrp->ifr_name, IFNAMSIZ); data/util-linux-2.36.1/libuuid/src/gen_uuid.c:237:16: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). save_umask = umask(0); data/util-linux-2.36.1/libuuid/src/gen_uuid.c:239:10: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). (void) umask(save_umask); data/util-linux-2.36.1/libuuid/src/parse.c:44:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(in); data/util-linux-2.36.1/libuuid/src/test_uuid.c:78:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((sz = read(fd, str, sizeof(str))) != 0) { data/util-linux-2.36.1/login-utils/ch-common.c:24:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len = strlen(str); data/util-linux-2.36.1/login-utils/chfn.c:120:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len = strlen(gecos); data/util-linux-2.36.1/login-utils/chsh.c:132:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(text); data/util-linux-2.36.1/login-utils/islocal.c:42:17: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((chin = getc(f)) != EOF) { data/util-linux-2.36.1/login-utils/login.c:195:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ignore_result( write(STDERR_FILENO, timeout_msg, strlen(timeout_msg)) ); data/util-linux-2.36.1/login-utils/login.c:261:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namesz = strlen(d->d_name); data/util-linux-2.36.1/login-utils/login.c:777:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(host) + 1 + strlen(dflt_prompt) + 1; data/util-linux-2.36.1/login-utils/login.c:777:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(host) + 1 + strlen(dflt_prompt) + 1; data/util-linux-2.36.1/login-utils/logindefs.c:115:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n = strlen(buf); data/util-linux-2.36.1/login-utils/logindefs.c:145:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = data + strlen(data); data/util-linux-2.36.1/login-utils/logindefs.c:413:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sz = strlen(name); data/util-linux-2.36.1/login-utils/logindefs.c:509:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf[strlen(buf) - 1] = '\0'; data/util-linux-2.36.1/login-utils/logindefs.c:521:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(pwd->pw_dir) + strlen(file) + 2 > sizeof(buf)) data/util-linux-2.36.1/login-utils/logindefs.c:521:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(pwd->pw_dir) + strlen(file) + 2 > sizeof(buf)) data/util-linux-2.36.1/login-utils/lslogins.c:339:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (*(s = buf + strlen(buf) - 1) == '\n') data/util-linux-2.36.1/login-utils/lslogins.c:1299:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). printf("%s:%*c%-36s\n", hstr, 35 - (int)strlen(hstr), ' ', dstr); data/util-linux-2.36.1/login-utils/newgrp.c:154:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). explicit_bzero(xpwd, strlen(xpwd)); data/util-linux-2.36.1/login-utils/newgrp.c:156:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xmemset_s(xpwd, strlen(xpwd), 0); data/util-linux-2.36.1/login-utils/nologin.c:103:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((rd = read(fd, buf, sizeof(buf))) > 0) data/util-linux-2.36.1/login-utils/setpwnam.c:101:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namelen = strlen(pwd->pw_name); data/util-linux-2.36.1/login-utils/setpwnam.c:111:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). contlen = strlen(linebuf); data/util-linux-2.36.1/login-utils/setpwnam.c:124:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). contlen = strlen(linebuf); data/util-linux-2.36.1/login-utils/setpwnam.c:215:2: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(0); data/util-linux-2.36.1/login-utils/su-common.c:804:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). arg0 = xmalloc(strlen(shell_basename) + 2); data/util-linux-2.36.1/login-utils/sulogin-consoles.c:67:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define strsize(string) (strlen((string))+1) data/util-linux-2.36.1/login-utils/sulogin.c:345:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(id, pass, off); data/util-linux-2.36.1/login-utils/sulogin.c:358:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(s); data/util-linux-2.36.1/login-utils/sulogin.c:383:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(pass) != 13) data/util-linux-2.36.1/login-utils/sulogin.c:639:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, &c, 1) < 1) { data/util-linux-2.36.1/login-utils/sulogin.c:759:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(home, "/"); data/util-linux-2.36.1/login-utils/utmpdump.c:181:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). length = read(fd, buf, sizeof(buf)); data/util-linux-2.36.1/login-utils/utmpdump.c:261:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dest, line, size); data/util-linux-2.36.1/login-utils/vipw.c:96:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((nr = read(from, buf, sizeof(buf))) > 0) data/util-linux-2.36.1/login-utils/vipw.c:135:8: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). (void)umask(0); data/util-linux-2.36.1/misc-utils/blkid.c:123:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cp); data/util-linux-2.36.1/misc-utils/blkid.c:146:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(str) + left_len; data/util-linux-2.36.1/misc-utils/blkid.c:253:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t namelen = strlen(name); data/util-linux-2.36.1/misc-utils/blkid.c:367:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). print_value(ctl, num++, devname, value, type, strlen(value)); data/util-linux-2.36.1/misc-utils/blkid.c:383:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t asz = a ? strlen(a) : 0; data/util-linux-2.36.1/misc-utils/blkid.c:384:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t bsz = b ? strlen(b) : 0; data/util-linux-2.36.1/misc-utils/blkid.c:836:60: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (!ctl.lowprobe && !ctl.eval && blkid_get_cache(&cache, read) < 0) data/util-linux-2.36.1/misc-utils/cal.c:704:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(cur_dh++, " "); data/util-linux-2.36.1/misc-utils/cal.c:717:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (ctl->week_width < strlen(ctl->full_month[i]) + year_len) data/util-linux-2.36.1/misc-utils/findmnt-verify.c:115:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(n_tgt); data/util-linux-2.36.1/misc-utils/getopt.c:129:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf = xmalloc(strlen(arg) * 4 + 3); data/util-linux-2.36.1/misc-utils/getopt.c:288:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(tokptr); data/util-linux-2.36.1/misc-utils/getopt.c:404:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ctl.optstr = xmalloc(strlen(argv[1]) + 1); data/util-linux-2.36.1/misc-utils/hardlink.c:187:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t namelen = strlen(name); data/util-linux-2.36.1/misc-utils/hardlink.c:231:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, buf, cksumsize) != cksumsize) { data/util-linux-2.36.1/misc-utils/hardlink.c:289:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((xsz = read(fd, ctl->iobuf1, rsize)) != rsize) data/util-linux-2.36.1/misc-utils/hardlink.c:291:22: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). else if ((xsz = read(fd2, ctl->iobuf2, rsize)) != rsize) data/util-linux-2.36.1/misc-utils/hardlink.c:322:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t suffixlen = strlen(suffix); data/util-linux-2.36.1/misc-utils/hardlink.c:323:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n2len = strlen(n2); data/util-linux-2.36.1/misc-utils/hardlink.c:479:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nam1baselen = strlen(dp->name); data/util-linux-2.36.1/misc-utils/hardlink.c:502:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (PCRE2_SPTR) di->d_name, strlen(di->d_name), 0, /* start at offset 0 */ data/util-linux-2.36.1/misc-utils/hardlink.c:518:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(di->d_name))); data/util-linux-2.36.1/misc-utils/kill.c:139:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lth = 1 + strlen(signame); data/util-linux-2.36.1/misc-utils/logger.c:245:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(path) >= sizeof(s_addr.sun_path)) data/util-linux-2.36.1/misc-utils/logger.c:440:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). v->iov_len = len ? len : strlen(str); \ data/util-linux-2.36.1/misc-utils/logger.c:464:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = xasprintf(&octet, "%zu ", strlen(ctl->hdr) + strlen(msg)); data/util-linux-2.36.1/misc-utils/logger.c:464:61: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = xasprintf(&octet, "%zu ", strlen(ctl->hdr) + strlen(msg)); data/util-linux-2.36.1/misc-utils/logger.c:800:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (255 < strlen(hostname)) data/util-linux-2.36.1/misc-utils/logger.c:806:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (48 < strlen(ctl->tag)) data/util-linux-2.36.1/misc-utils/logger.c:956:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(*argv); data/util-linux-2.36.1/misc-utils/logger.c:985:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t max_usrmsg_size = ctl->max_message_size - strlen(ctl->hdr); data/util-linux-2.36.1/misc-utils/logger.c:991:6: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getchar(); data/util-linux-2.36.1/misc-utils/logger.c:997:23: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (isdigit(c = getchar()) && pri <= 191) { data/util-linux-2.36.1/misc-utils/logger.c:1015:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ctl->max_message_size - strlen(ctl->hdr); data/util-linux-2.36.1/misc-utils/logger.c:1019:9: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getchar(); data/util-linux-2.36.1/misc-utils/logger.c:1024:8: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getchar(); data/util-linux-2.36.1/misc-utils/logger.c:1036:8: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getchar(); data/util-linux-2.36.1/misc-utils/look.c:186:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). stringlen = strlen(string); data/util-linux-2.36.1/misc-utils/lsblk-properties.c:140:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(pattern); data/util-linux-2.36.1/misc-utils/lsblk.c:522:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(sub); data/util-linux-2.36.1/misc-utils/lsblk.c:2003:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lsblk->tree_id = column_name_to_id(optarg, strlen(optarg)); data/util-linux-2.36.1/misc-utils/lsblk.c:2010:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lsblk->dedup_id = column_name_to_id(optarg, strlen(optarg)); data/util-linux-2.36.1/misc-utils/lsblk.c:2017:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lsblk->sort_id = column_name_to_id(optarg, strlen(optarg)); data/util-linux-2.36.1/misc-utils/lslocks.c:184:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((len = strlen(path)) >= (sizeof(path) - 2)) data/util-linux-2.36.1/misc-utils/lslocks.c:258:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tok[strlen(tok) - 1] = '\0'; data/util-linux-2.36.1/misc-utils/lslocks.c:301:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tok[strlen(tok)-1] = '\0'; data/util-linux-2.36.1/misc-utils/namei.c:128:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(dirname); data/util-linux-2.36.1/misc-utils/rename.c:56:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *newname = xmalloc(strlen(orig) + strlen(to) + 1); data/util-linux-2.36.1/misc-utils/rename.c:56:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *newname = xmalloc(strlen(orig) + strlen(to) + 1); data/util-linux-2.36.1/misc-utils/rename.c:63:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = where + strlen(from); data/util-linux-2.36.1/misc-utils/rename.c:76:11: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c = fgetc(stdin)) == EOF) { data/util-linux-2.36.1/misc-utils/rename.c:94:16: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = fgetc(stdin)) != '\n' && c != EOF); data/util-linux-2.36.1/misc-utils/uuidd.c:121:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(socket_path) < sizeof(srv_addr.sun_path)); data/util-linux-2.36.1/misc-utils/uuidd.c:255:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(socket_path) < sizeof(my_addr.sun_path)); data/util-linux-2.36.1/misc-utils/uuidd.c:258:15: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). save_umask = umask(0); data/util-linux-2.36.1/misc-utils/uuidd.c:265:2: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(save_umask); data/util-linux-2.36.1/misc-utils/uuidd.c:285:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). bytes = read(fd, &info, sizeof(info)); data/util-linux-2.36.1/misc-utils/uuidd.c:367:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). write_all(fd_pidfile, reply_buf, strlen(reply_buf)); data/util-linux-2.36.1/misc-utils/uuidd.c:433:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). len = read(ns, &op, 1); data/util-linux-2.36.1/misc-utils/uuidd.c:455:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). reply_len = strlen(reply_buf) + 1; data/util-linux-2.36.1/misc-utils/uuidd.c:459:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). reply_len = strlen(reply_buf) + 1; data/util-linux-2.36.1/misc-utils/uuidd.c:641:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(socket_path) >= sizeof(((struct sockaddr_un *)0)->sun_path)) data/util-linux-2.36.1/misc-utils/uuidgen.c:162:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namelen = strlen(name); data/util-linux-2.36.1/misc-utils/whereis.c:395:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int i = strlen(dp); data/util-linux-2.36.1/sys-utils/chmem.c:136:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!enable && strncasecmp(line, zn, strlen(zn)) != 0) data/util-linux-2.36.1/sys-utils/chmem.c:221:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!enable && strncasecmp(line, zn, strlen(zn)) != 0) { data/util-linux-2.36.1/sys-utils/chmem.c:279:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (isdigit(str[strlen(str) - 1])) data/util-linux-2.36.1/sys-utils/chmem.c:295:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(start) < 2 || start[1] != 'x') data/util-linux-2.36.1/sys-utils/chmem.c:297:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(end) < 2 || end[1] != 'x') data/util-linux-2.36.1/sys-utils/dmesg.c:344:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str); data/util-linux-2.36.1/sys-utils/dmesg.c:384:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str); data/util-linux-2.36.1/sys-utils/dmesg.c:998:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ctl->indent += strlen(fpbuf); data/util-linux-2.36.1/sys-utils/dmesg.c:1039:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mesg_size = strlen(line); data/util-linux-2.36.1/sys-utils/dmesg.c:1073:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mesg_size = strlen(line); data/util-linux-2.36.1/sys-utils/dmesg.c:1107:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). size = read(ctl->kmsg, ctl->kmsg_buf, data/util-linux-2.36.1/sys-utils/eject.c:515:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (str && strncmp(name, str, strlen(name)) != 0) { data/util-linux-2.36.1/sys-utils/eject.c:875:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (ctl.device[strlen(ctl.device) - 1] == '/') data/util-linux-2.36.1/sys-utils/eject.c:876:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ctl.device[strlen(ctl.device) - 1] = '\0'; data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:1124:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). # define yystrlen strlen data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:2747:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wordlen = strlen (word); data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:2994:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t tzsize = strlen (tz) + 1; data/util-linux-2.36.1/sys-utils/ipcutils.c:115:9: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (fgetc(f) != '\n'); /* skip header */ data/util-linux-2.36.1/sys-utils/ipcutils.c:263:9: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (fgetc(f) != '\n') ; /* skip header */ data/util-linux-2.36.1/sys-utils/ipcutils.c:371:9: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (fgetc(f) != '\n') ; /* skip header */ data/util-linux-2.36.1/sys-utils/ipcutils.c:502:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (msg[strlen(msg) - 1] == '=') data/util-linux-2.36.1/sys-utils/irq-common.c:239:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(line); data/util-linux-2.36.1/sys-utils/irqtop.c:182:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(tfd, &unused, sizeof(unused)) < 0) data/util-linux-2.36.1/sys-utils/irqtop.c:185:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(sfd, &siginfo, sizeof(siginfo)) < 0) { data/util-linux-2.36.1/sys-utils/irqtop.c:202:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(STDIN_FILENO, &c, 1) != 1) data/util-linux-2.36.1/sys-utils/ldattach.c:460:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (write_all(tty_fd, introparm, strlen(introparm)) != 0) data/util-linux-2.36.1/sys-utils/lscpu-dmi.c:87:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bp += strlen(bp); data/util-linux-2.36.1/sys-utils/lscpu.c:269:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(pattern); data/util-linux-2.36.1/sys-utils/lscpu.c:295:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(line) - 1; data/util-linux-2.36.1/sys-utils/lscpu.c:768:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i += strlen(&buf[i]); data/util-linux-2.36.1/sys-utils/lscpu.c:803:8: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. if (fscanf(fd, "%255s", buf) == 1 && !strcmp(buf, "full")) data/util-linux-2.36.1/sys-utils/lscpu.c:967:8: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. if (fscanf(fd, "%255s", buf) == 1 && data/util-linux-2.36.1/sys-utils/lscpu.c:1011:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str += strlen(str) - 1; data/util-linux-2.36.1/sys-utils/lscpu.c:1015:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(str, str + 1, strlen(str)); data/util-linux-2.36.1/sys-utils/lsipc.c:416:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). printf("%s:%*c%-36s\n", hstr, 35 - (int)strlen(hstr), ' ', dstr); data/util-linux-2.36.1/sys-utils/lsipc.c:456:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (*(s = buf + strlen(buf) - 1) == '\n') data/util-linux-2.36.1/sys-utils/lsipc.c:997:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). arg = xcalloc(1, sizeof(char) * strlen(_("dest")) data/util-linux-2.36.1/sys-utils/lsipc.c:998:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(_("locked")) data/util-linux-2.36.1/sys-utils/lsipc.c:999:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(_("hugetlb")) data/util-linux-2.36.1/sys-utils/lsipc.c:1000:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(_("noreserve")) + 4); data/util-linux-2.36.1/sys-utils/lsmem.c:287:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(valid_zones) + data/util-linux-2.36.1/sys-utils/lsmem.c:288:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(zone_names[zone_id]) > BUFSIZ - 2) data/util-linux-2.36.1/sys-utils/lsmem.c:292:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(valid_zones, "/"); data/util-linux-2.36.1/sys-utils/lsns.c:653:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). elt_len = strlen(elt); data/util-linux-2.36.1/sys-utils/lsns.c:654:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path_set_len = strlen(path_set); data/util-linux-2.36.1/sys-utils/readprofile.c:66:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(name); data/util-linux-2.36.1/sys-utils/readprofile.c:93:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(BOOT_SYSTEM_MAP) + strlen(uname_info.release) + 1; data/util-linux-2.36.1/sys-utils/readprofile.c:93:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(BOOT_SYSTEM_MAP) + strlen(uname_info.release) + 1; data/util-linux-2.36.1/sys-utils/readprofile.c:254:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rc = read(proFd, buf, len); data/util-linux-2.36.1/sys-utils/rfkill.c:208:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ssize_t len = read(fd, event, sizeof(*event)); data/util-linux-2.36.1/sys-utils/rtcwake.c:257:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ss = read(fd, &buf, sizeof(buf) - 1); data/util-linux-2.36.1/sys-utils/rtcwake.c:639:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). t = read(fd, &data, sizeof data); data/util-linux-2.36.1/sys-utils/setpriv.c:263:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). len = read(fd, buf, sizeof(buf)); data/util-linux-2.36.1/sys-utils/setpriv.c:630:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(label); data/util-linux-2.36.1/sys-utils/swapon.c:432:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). datasz = read(fd, buf, MAX_PAGESIZE); data/util-linux-2.36.1/sys-utils/unshare.c:115:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (write_all(fd, cmd, strlen(cmd))) data/util-linux-2.36.1/sys-utils/unshare.c:130:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (write_all(fd, buf, strlen(buf))) data/util-linux-2.36.1/term-utils/agetty.c:442:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(options.initstring)); data/util-linux-2.36.1/term-utils/agetty.c:466:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (read(STDIN_FILENO, &ch, 1) == 1) { data/util-linux-2.36.1/term-utils/agetty.c:577:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t usz = username ? strlen(username) : 0; data/util-linux-2.36.1/term-utils/agetty.c:587:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(str); data/util-linux-2.36.1/term-utils/agetty.c:697:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define is_speed(str) (strlen((str)) == strspn((str), "0123456789,")) data/util-linux-2.36.1/term-utils/agetty.c:919:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strspn(op->tty + 3, "0123456789") == strlen(op->tty+3)) data/util-linux-2.36.1/term-utils/agetty.c:996:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(line); data/util-linux-2.36.1/term-utils/agetty.c:1454:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((nread = read(STDIN_FILENO, buf, sizeof(buf) - 1)) > 0) { data/util-linux-2.36.1/term-utils/agetty.c:1515:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t varsz = strlen(varname); data/util-linux-2.36.1/term-utils/agetty.c:1725:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (read(inotify_fd, buffer, sizeof (buffer)) > 0); data/util-linux-2.36.1/term-utils/agetty.c:1746:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namesz = strlen(d->d_name); data/util-linux-2.36.1/term-utils/agetty.c:1845:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getc(f)) != EOF) { data/util-linux-2.36.1/term-utils/agetty.c:1847:28: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). output_special_char(ie, getc(f), op, tp, f); data/util-linux-2.36.1/term-utils/agetty.c:2045:3: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). getc(stdin); data/util-linux-2.36.1/term-utils/agetty.c:2099:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). write_all(STDOUT_FILENO, cn, strlen(cn)); data/util-linux-2.36.1/term-utils/agetty.c:2196:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). readres = read(STDIN_FILENO, &c, 1); data/util-linux-2.36.1/term-utils/agetty.c:2527:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). write_all(fd, buf, strlen(buf)); data/util-linux-2.36.1/term-utils/agetty.c:2655:10: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int c = fgetc(fd); data/util-linux-2.36.1/term-utils/agetty.c:2663:7: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = fgetc(fd); data/util-linux-2.36.1/term-utils/agetty.c:2862:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). op->initstring = malloc(strlen(arg) + 1); data/util-linux-2.36.1/term-utils/agetty.c:2914:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dsz = strlen(dest); data/util-linux-2.36.1/term-utils/agetty.c:2916:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssz = strlen(sep); data/util-linux-2.36.1/term-utils/agetty.c:2917:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(src); data/util-linux-2.36.1/term-utils/agetty.c:2943:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(nm) > 42) data/util-linux-2.36.1/term-utils/script-playutils.c:85:13: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while((c = fgetc(f)) != EOF && c != '\n'); data/util-linux-2.36.1/term-utils/script-playutils.c:195:7: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = fgetc(stp->timing_fp); data/util-linux-2.36.1/term-utils/script-playutils.c:330:8: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. rc = fscanf(f, "%128s", buf); /* name */ data/util-linux-2.36.1/term-utils/scriptreplay.c:118:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(buf); data/util-linux-2.36.1/term-utils/setterm.c:801:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, header, 4) != 4) data/util-linux-2.36.1/term-utils/setterm.c:811:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rc = read(fd, inbuf, rows * cols * 2); data/util-linux-2.36.1/term-utils/setterm.c:907:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (write_all(STDIN_FILENO, getpos, strlen(getpos)) < 0) { data/util-linux-2.36.1/term-utils/setterm.c:916:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(STDIN_FILENO, retstr + pos, data/util-linux-2.36.1/term-utils/wall.c:292:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(s); data/util-linux-2.36.1/term-utils/wall.c:371:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). date[strlen(date) - 1] = '\0'; data/util-linux-2.36.1/term-utils/write.c:182:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (memcmp(u->ut_line, ctl->src_tty_name, strlen(ctl->src_tty_name) + 1) == 0) { data/util-linux-2.36.1/text-utils/colcrt.c:104:9: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = wcslen(s); data/util-linux-2.36.1/text-utils/hexdump-parse.c:426:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pr->fmt = xmalloc(strlen(fmtp) + strlen(cs) + 1); data/util-linux-2.36.1/text-utils/hexdump-parse.c:426:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pr->fmt = xmalloc(strlen(fmtp) + strlen(cs) + 1); data/util-linux-2.36.1/text-utils/hexdump-parse.c:499:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cfmt += strlen(clr); data/util-linux-2.36.1/text-utils/hexdump-parse.c:544:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cfmt += strlen(hcnext->str); data/util-linux-2.36.1/text-utils/hexdump-parse.c:591:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (hcnext->str && (int)strlen(hcnext->str) != hcnext->range) data/util-linux-2.36.1/text-utils/more.c:375:12: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int ret = getc(ctl->current_file); data/util-linux-2.36.1/text-utils/more.c:795:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(STDERR_FILENO, &c, 1) <= 0) { data/util-linux-2.36.1/text-utils/more.c:813:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((ilen = read(STDERR_FILENO, &input, sizeof(input))) <= 0) data/util-linux-2.36.1/text-utils/more.c:969:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ctl->prompt_len += strlen(mess); data/util-linux-2.36.1/text-utils/more.c:1118:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xtra = strlen(ctl->file_names[ctl->argv_position]) + strlen(ctl->shell_line) + 1; data/util-linux-2.36.1/text-utils/more.c:1118:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xtra = strlen(ctl->file_names[ctl->argv_position]) + strlen(ctl->shell_line) + 1; data/util-linux-2.36.1/text-utils/more.c:1134:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). outstr += strlen(ctl->file_names[ctl->argv_position]); data/util-linux-2.36.1/text-utils/more.c:1141:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). outstr += strlen(ctl->shell_line); data/util-linux-2.36.1/text-utils/more.c:1360:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). sz = read(pfd[0].fd, &info, sizeof(info)); data/util-linux-2.36.1/text-utils/pg.c:307:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). write_all(STDOUT_FILENO, message, strlen(message)); data/util-linux-2.36.1/text-utils/pg.c:586:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf = xmalloc(strlen(cmdstr) + 1); data/util-linux-2.36.1/text-utils/pg.c:593:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *(buf + strlen(buf) - 1) = '\0'; data/util-linux-2.36.1/text-utils/pg.c:640:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). switch (read(STDOUT_FILENO, &key, 1)) { data/util-linux-2.36.1/text-utils/pg.c:769:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(s), wl; data/util-linux-2.36.1/text-utils/pg.c:873:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = cmd.cmdline + strlen(cmd.cmdline) - 1; data/util-linux-2.36.1/text-utils/pg.c:875:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = cmd.cmdline + strlen(cmd.cmdline) - 2; data/util-linux-2.36.1/text-utils/pg.c:1362:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cmd.cmdline)); data/util-linux-2.36.1/text-utils/pg.c:1406:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(copyright)); data/util-linux-2.36.1/text-utils/pg.c:1408:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(help)); data/util-linux-2.36.1/text-utils/pg.c:1528:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). write_all(STDOUT_FILENO, argv[arg], strlen(argv[arg])); data/util-linux-2.36.1/text-utils/pg.c:1676:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = searchfor + strlen(searchfor) - 1; data/util-linux-2.36.1/text-utils/rev.c:150:10: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = wcslen(buf); data/util-linux-2.36.1/text-utils/rev.c:167:11: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = wcslen(buf); ANALYSIS SUMMARY: Hits = 2235 Lines analyzed = 193142 in approximately 4.85 seconds (39794 lines/second) Physical Source Lines of Code (SLOC) = 137827 Hits@level = [0] 1965 [1] 441 [2] 1047 [3] 208 [4] 527 [5] 12 Hits@level+ = [0+] 4200 [1+] 2235 [2+] 1794 [3+] 747 [4+] 539 [5+] 12 Hits/KSLOC@level+ = [0+] 30.473 [1+] 16.216 [2+] 13.0163 [3+] 5.41984 [4+] 3.9107 [5+] 0.0870657 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.