r6000) | xpinstall/wizard/os2/setup/dialogs.c:2115 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6001) | xpinstall/wizard/os2/setup/dialogs.c:227 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6002) | xpinstall/wizard/os2/setup/dialogs.c:460 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6003) | xpinstall/wizard/os2/setup/dialogs.c:486 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6004) | xpinstall/wizard/os2/setup/dialogs.c:504 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6005) | xpinstall/wizard/os2/setup/dialogs.c:524 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6006) | xpinstall/wizard/os2/setup/dialogs.c:596 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6007) | xpinstall/wizard/os2/setup/dialogs.c:687 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6008) | xpinstall/wizard/os2/setup/dialogs.c:744 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6009) | xpinstall/wizard/os2/setup/dialogs.c:746 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6010) | xpinstall/wizard/os2/setup/dialogs.c:807 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6011) | xpinstall/wizard/os2/setup/dialogs.c:857 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6012) | xpinstall/wizard/os2/setup/dialogs.c:1127 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6013) | xpinstall/wizard/os2/setup/dialogs.c:1201 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6014) | xpinstall/wizard/os2/setup/dialogs.c:1205 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6015) | xpinstall/wizard/os2/setup/dialogs.c:1267 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6016) | xpinstall/wizard/os2/setup/dialogs.c:2010 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6017) | xpinstall/wizard/os2/setup/dialogs.c:2361 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6018) | xpinstall/wizard/os2/setup/dialogs.c:2381 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6019) | xpinstall/wizard/os2/setup/dialogs.c:2391 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6020) | xpinstall/wizard/os2/setup/extra.c:229 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6021) | xpinstall/wizard/os2/setup/extra.c:429 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6022) | xpinstall/wizard/os2/setup/extra.c:445 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6023) | xpinstall/wizard/os2/setup/extra.c:689 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6024) | xpinstall/wizard/os2/setup/extra.c:773 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6025) | xpinstall/wizard/os2/setup/extra.c:791 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6026) | xpinstall/wizard/os2/setup/extra.c:809 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6027) | xpinstall/wizard/os2/setup/extra.c:1094 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6028) | xpinstall/wizard/os2/setup/extra.c:1731 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6029) | xpinstall/wizard/os2/setup/extra.c:1759 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6031) | xpinstall/wizard/os2/setup/extra.c:1779 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6032) | xpinstall/wizard/os2/setup/extra.c:1794 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6033) | xpinstall/wizard/os2/setup/extra.c:1798 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6035) | xpinstall/wizard/os2/setup/extra.c:1813 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6036) | xpinstall/wizard/os2/setup/extra.c:1823 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6037) | xpinstall/wizard/os2/setup/extra.c:1829 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6038) | xpinstall/wizard/os2/setup/extra.c:2156 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6039) | xpinstall/wizard/os2/setup/extra.c:2365 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6040) | xpinstall/wizard/os2/setup/extra.c:2383 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6041) | xpinstall/wizard/os2/setup/extra.c:2393 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6042) | xpinstall/wizard/os2/setup/extra.c:65 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6043) | xpinstall/wizard/os2/setup/extra.c:135 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6044) | xpinstall/wizard/os2/setup/extra.c:155 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6045) | xpinstall/wizard/os2/setup/extra.c:172 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6046) | xpinstall/wizard/os2/setup/extra.c:183 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6047) | xpinstall/wizard/os2/setup/extra.c:195 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6048) | xpinstall/wizard/os2/setup/extra.c:196 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6049) | xpinstall/wizard/os2/setup/extra.c:221 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6051) | xpinstall/wizard/os2/setup/extra.c:244 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6052) | xpinstall/wizard/os2/setup/extra.c:268 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6053) | xpinstall/wizard/os2/setup/extra.c:269 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6054) | xpinstall/wizard/os2/setup/extra.c:270 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6055) | xpinstall/wizard/os2/setup/extra.c:304 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6056) | xpinstall/wizard/os2/setup/extra.c:305 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6057) | xpinstall/wizard/os2/setup/extra.c:328 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6058) | xpinstall/wizard/os2/setup/extra.c:405 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6059) | xpinstall/wizard/os2/setup/extra.c:426 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6060) | xpinstall/wizard/os2/setup/extra.c:491 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6061) | xpinstall/wizard/os2/setup/extra.c:492 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6062) | xpinstall/wizard/os2/setup/extra.c:527 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6063) | xpinstall/wizard/os2/setup/extra.c:528 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6064) | xpinstall/wizard/os2/setup/extra.c:529 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6065) | xpinstall/wizard/os2/setup/extra.c:543 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6066) | xpinstall/wizard/os2/setup/extra.c:558 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6067) | xpinstall/wizard/os2/setup/extra.c:559 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6068) | xpinstall/wizard/os2/setup/extra.c:560 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6069) | xpinstall/wizard/os2/setup/extra.c:561 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6070) | xpinstall/wizard/os2/setup/extra.c:588 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6071) | xpinstall/wizard/os2/setup/extra.c:606 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6072) | xpinstall/wizard/os2/setup/extra.c:607 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6073) | xpinstall/wizard/os2/setup/extra.c:608 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6074) | xpinstall/wizard/os2/setup/extra.c:609 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6075) | xpinstall/wizard/os2/setup/extra.c:636 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6076) | xpinstall/wizard/os2/setup/extra.c:655 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6077) | xpinstall/wizard/os2/setup/extra.c:656 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6079) | xpinstall/wizard/os2/setup/extra.c:658 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6080) | xpinstall/wizard/os2/setup/extra.c:777 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6081) | xpinstall/wizard/os2/setup/extra.c:818 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6082) | xpinstall/wizard/os2/setup/extra.c:819 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6083) | xpinstall/wizard/os2/setup/extra.c:820 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6084) | xpinstall/wizard/os2/setup/extra.c:830 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6085) | xpinstall/wizard/os2/setup/extra.c:851 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6086) | xpinstall/wizard/os2/setup/extra.c:852 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6087) | xpinstall/wizard/os2/setup/extra.c:853 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6088) | xpinstall/wizard/os2/setup/extra.c:854 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6089) | xpinstall/wizard/os2/setup/extra.c:855 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6090) | xpinstall/wizard/os2/setup/extra.c:856 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6091) | xpinstall/wizard/os2/setup/extra.c:976 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6092) | xpinstall/wizard/os2/setup/extra.c:997 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6093) | xpinstall/wizard/os2/setup/extra.c:998 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6094) | xpinstall/wizard/os2/setup/extra.c:999 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6095) | xpinstall/wizard/os2/setup/extra.c:1000 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6096) | xpinstall/wizard/os2/setup/extra.c:1001 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6097) | xpinstall/wizard/os2/setup/extra.c:1002 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6098) | xpinstall/wizard/os2/setup/extra.c:1043 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6099) | xpinstall/wizard/os2/setup/extra.c:1074 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6100) | xpinstall/wizard/os2/setup/extra.c:1075 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6101) | xpinstall/wizard/os2/setup/extra.c:1076 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6102) | xpinstall/wizard/os2/setup/extra.c:1077 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6103) | xpinstall/wizard/os2/setup/extra.c:1103 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6104) | xpinstall/wizard/os2/setup/extra.c:1104 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6105) | xpinstall/wizard/os2/setup/extra.c:1174 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6106) | xpinstall/wizard/os2/setup/extra.c:1175 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6107) | xpinstall/wizard/os2/setup/extra.c:1176 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6108) | xpinstall/wizard/os2/setup/extra.c:1177 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6109) | xpinstall/wizard/os2/setup/extra.c:1178 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6110) | xpinstall/wizard/os2/setup/extra.c:1179 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6111) | xpinstall/wizard/os2/setup/extra.c:1294 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6112) | xpinstall/wizard/os2/setup/extra.c:1559 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6113) | xpinstall/wizard/os2/setup/extra.c:1560 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6114) | xpinstall/wizard/os2/setup/extra.c:1596 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6115) | xpinstall/wizard/os2/setup/extra.c:1597 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6116) | xpinstall/wizard/os2/setup/extra.c:1598 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6117) | xpinstall/wizard/os2/setup/extra.c:1688 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6118) | xpinstall/wizard/os2/setup/extra.c:1689 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6119) | xpinstall/wizard/os2/setup/extra.c:1703 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6120) | xpinstall/wizard/os2/setup/extra.c:2094 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6121) | xpinstall/wizard/os2/setup/extra.c:2472 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6122) | xpinstall/wizard/os2/setup/extra.c:2473 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6123) | xpinstall/wizard/os2/setup/extra.c:2487 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6124) | xpinstall/wizard/os2/setup/extra.c:2488 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6125) | xpinstall/wizard/os2/setup/extra.c:2509 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6126) | xpinstall/wizard/os2/setup/extra.c:2510 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6127) | xpinstall/wizard/os2/setup/extra.c:2511 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6128) | xpinstall/wizard/os2/setup/extra.c:2512 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6129) | xpinstall/wizard/os2/setup/extra.c:2513 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6130) | xpinstall/wizard/os2/setup/extra.c:2514 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6131) | xpinstall/wizard/os2/setup/extra.c:3076 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6132) | xpinstall/wizard/os2/setup/extra.c:3093 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6133) | xpinstall/wizard/os2/setup/extra.c:3094 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6134) | xpinstall/wizard/os2/setup/extra.c:3107 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6135) | xpinstall/wizard/os2/setup/extra.c:3131 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6136) | xpinstall/wizard/os2/setup/extra.c:3132 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6137) | xpinstall/wizard/os2/setup/extra.c:3133 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6138) | xpinstall/wizard/os2/setup/extra.c:3134 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6139) | xpinstall/wizard/os2/setup/extra.c:3135 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6140) | xpinstall/wizard/os2/setup/extra.c:3136 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6141) | xpinstall/wizard/os2/setup/extra.c:3137 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6142) | xpinstall/wizard/os2/setup/extra.c:3138 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6143) | xpinstall/wizard/os2/setup/extra.c:3139 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6144) | xpinstall/wizard/os2/setup/extra.c:3140 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6145) | xpinstall/wizard/os2/setup/extra.c:3191 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6146) | xpinstall/wizard/os2/setup/extra.c:3192 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6147) | xpinstall/wizard/os2/setup/extra.c:3193 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6148) | xpinstall/wizard/os2/setup/extra.c:3250 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6149) | xpinstall/wizard/os2/setup/extra.c:3251 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6150) | xpinstall/wizard/os2/setup/extra.c:3252 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6151) | xpinstall/wizard/os2/setup/extra.c:3333 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6152) | xpinstall/wizard/os2/setup/extra.c:3349 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6153) | xpinstall/wizard/os2/setup/extra.c:3429 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6154) | xpinstall/wizard/os2/setup/extra.c:3430 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6155) | xpinstall/wizard/os2/setup/extra.c:3431 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6156) | xpinstall/wizard/os2/setup/extra.c:3432 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6157) | xpinstall/wizard/os2/setup/extra.c:3433 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6158) | xpinstall/wizard/os2/setup/extra.c:3483 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6159) | xpinstall/wizard/os2/setup/extra.c:3484 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6160) | xpinstall/wizard/os2/setup/extra.c:3485 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6161) | xpinstall/wizard/os2/setup/extra.c:3531 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6162) | xpinstall/wizard/os2/setup/extra.c:3532 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6163) | xpinstall/wizard/os2/setup/extra.c:3533 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6164) | xpinstall/wizard/os2/setup/extra.c:3534 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6165) | xpinstall/wizard/os2/setup/extra.c:3535 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6166) | xpinstall/wizard/os2/setup/extra.c:3536 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6167) | xpinstall/wizard/os2/setup/extra.c:3537 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6168) | xpinstall/wizard/os2/setup/extra.c:3538 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6169) | xpinstall/wizard/os2/setup/extra.c:3539 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6170) | xpinstall/wizard/os2/setup/extra.c:3705 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6171) | xpinstall/wizard/os2/setup/extra.c:3706 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6172) | xpinstall/wizard/os2/setup/extra.c:3707 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6173) | xpinstall/wizard/os2/setup/extra.c:3726 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6174) | xpinstall/wizard/os2/setup/extra.c:3727 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6175) | xpinstall/wizard/os2/setup/extra.c:3728 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6176) | xpinstall/wizard/os2/setup/extra.c:3729 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6177) | xpinstall/wizard/os2/setup/extra.c:3730 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6178) | xpinstall/wizard/os2/setup/extra.c:3731 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6179) | xpinstall/wizard/os2/setup/extra.c:3791 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6180) | xpinstall/wizard/os2/setup/extra.c:3792 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6181) | xpinstall/wizard/os2/setup/extra.c:3793 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6182) | xpinstall/wizard/os2/setup/extra.c:3794 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6183) | xpinstall/wizard/os2/setup/extra.c:3795 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6184) | xpinstall/wizard/os2/setup/extra.c:3796 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6185) | xpinstall/wizard/os2/setup/extra.c:3797 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6186) | xpinstall/wizard/os2/setup/extra.c:3848 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6187) | xpinstall/wizard/os2/setup/extra.c:3906 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6188) | xpinstall/wizard/os2/setup/extra.c:3947 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6189) | xpinstall/wizard/os2/setup/extra.c:3982 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6190) | xpinstall/wizard/os2/setup/extra.c:4295 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6191) | xpinstall/wizard/os2/setup/extra.c:4296 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6192) | xpinstall/wizard/os2/setup/extra.c:4297 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6195) | xpinstall/wizard/os2/setup/extra.c:4331 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6196) | xpinstall/wizard/os2/setup/extra.c:4387 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6197) | xpinstall/wizard/os2/setup/extra.c:4484 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6198) | xpinstall/wizard/os2/setup/extra.c:4485 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6199) | xpinstall/wizard/os2/setup/extra.c:4489 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6200) | xpinstall/wizard/os2/setup/extra.c:4562 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6201) | xpinstall/wizard/os2/setup/extra.c:4563 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6202) | xpinstall/wizard/os2/setup/extra.c:4564 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6203) | xpinstall/wizard/os2/setup/extra.c:4565 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6204) | xpinstall/wizard/os2/setup/extra.c:4566 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6205) | xpinstall/wizard/os2/setup/extra.c:4567 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6206) | xpinstall/wizard/os2/setup/extra.c:4568 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6207) | xpinstall/wizard/os2/setup/extra.c:4569 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6208) | xpinstall/wizard/os2/setup/extra.c:4570 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6209) | xpinstall/wizard/os2/setup/extra.c:4744 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6210) | xpinstall/wizard/os2/setup/extra.c:4745 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6211) | xpinstall/wizard/os2/setup/extra.c:4746 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6212) | xpinstall/wizard/os2/setup/extra.c:4747 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6213) | xpinstall/wizard/os2/setup/extra.c:4816 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6214) | xpinstall/wizard/os2/setup/extra.c:4817 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6215) | xpinstall/wizard/os2/setup/extra.c:4822 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6216) | xpinstall/wizard/os2/setup/extra.c:4823 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6217) | xpinstall/wizard/os2/setup/extra.c:4824 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6218) | xpinstall/wizard/os2/setup/extra.c:4870 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6219) | xpinstall/wizard/os2/setup/extra.c:4871 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6220) | xpinstall/wizard/os2/setup/extra.c:4872 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6221) | xpinstall/wizard/os2/setup/extra.c:4873 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6222) | xpinstall/wizard/os2/setup/extra.c:5305 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6223) | xpinstall/wizard/os2/setup/extra.c:5327 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6224) | xpinstall/wizard/os2/setup/extra.c:5419 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6225) | xpinstall/wizard/os2/setup/extra.c:5420 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6227) | xpinstall/wizard/os2/setup/extra.c:5448 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6228) | xpinstall/wizard/os2/setup/extra.c:5474 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6229) | xpinstall/wizard/os2/setup/extra.c:5475 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6230) | xpinstall/wizard/os2/setup/extra.c:5476 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6231) | xpinstall/wizard/os2/setup/extra.c:5477 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6232) | xpinstall/wizard/os2/setup/extra.c:5478 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6233) | xpinstall/wizard/os2/setup/extra.c:5580 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6234) | xpinstall/wizard/os2/setup/extra.c:5581 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6235) | xpinstall/wizard/os2/setup/extra.c:5582 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6236) | xpinstall/wizard/os2/setup/extra.c:5583 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6237) | xpinstall/wizard/os2/setup/extra.c:5584 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6238) | xpinstall/wizard/os2/setup/extra.c:5585 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6239) | xpinstall/wizard/os2/setup/extra.c:5699 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6240) | xpinstall/wizard/os2/setup/extra.c:5714 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6241) | xpinstall/wizard/os2/setup/extra.c:5739 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6242) | xpinstall/wizard/os2/setup/extra.c:5740 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6243) | xpinstall/wizard/os2/setup/extra.c:5741 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6244) | xpinstall/wizard/os2/setup/extra.c:5742 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6245) | xpinstall/wizard/os2/setup/extra.c:5743 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6246) | xpinstall/wizard/os2/setup/extra.c:5744 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6247) | xpinstall/wizard/os2/setup/extra.c:5858 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6248) | xpinstall/wizard/os2/setup/extra.c:5912 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6249) | xpinstall/wizard/os2/setup/extra.c:5957 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6250) | xpinstall/wizard/os2/setup/extra.c:5975 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6252) | xpinstall/wizard/os2/setup/extra.c:6011 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6253) | xpinstall/wizard/os2/setup/extra.c:6029 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6254) | xpinstall/wizard/os2/setup/extra.c:6047 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6255) | xpinstall/wizard/os2/setup/extra.c:6065 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6256) | xpinstall/wizard/os2/setup/extra.c:6083 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6257) | xpinstall/wizard/os2/setup/extra.c:6102 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6258) | xpinstall/wizard/os2/setup/extra.c:6164 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6259) | xpinstall/wizard/os2/setup/extra.c:6175 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6260) | xpinstall/wizard/os2/setup/extra.c:6176 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6261) | xpinstall/wizard/os2/setup/extra.c:6203 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6262) | xpinstall/wizard/os2/setup/extra.c:6245 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6263) | xpinstall/wizard/os2/setup/extra.c:6297 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6264) | xpinstall/wizard/os2/setup/extra.c:6323 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6265) | xpinstall/wizard/os2/setup/extra.c:6324 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6266) | xpinstall/wizard/os2/setup/extra.c:6325 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6267) | xpinstall/wizard/os2/setup/extra.c:6326 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6268) | xpinstall/wizard/os2/setup/extra.c:6327 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6269) | xpinstall/wizard/os2/setup/extra.c:6356 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6289) | xpinstall/wizard/os2/setup/extra.c:145 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6290) | xpinstall/wizard/os2/setup/extra.c:162 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6291) | xpinstall/wizard/os2/setup/extra.c:335 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6292) | xpinstall/wizard/os2/setup/extra.c:430 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6294) | xpinstall/wizard/os2/setup/extra.c:592 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6296) | xpinstall/wizard/os2/setup/extra.c:839 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6297) | xpinstall/wizard/os2/setup/extra.c:1048 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6298) | xpinstall/wizard/os2/setup/extra.c:1108 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6299) | xpinstall/wizard/os2/setup/extra.c:1601 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6300) | xpinstall/wizard/os2/setup/extra.c:3113 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6301) | xpinstall/wizard/os2/setup/extra.c:3170 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6303) | xpinstall/wizard/os2/setup/extra.c:4833 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6304) | xpinstall/wizard/os2/setup/extra.c:4841 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6305) | xpinstall/wizard/os2/setup/extra.c:5313 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6306) | xpinstall/wizard/os2/setup/extra.c:5340 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6307) | xpinstall/wizard/os2/setup/extra.c:6208 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6308) | xpinstall/wizard/os2/setup/extra.c:283 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6309) | xpinstall/wizard/os2/setup/extra.c:289 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6310) | xpinstall/wizard/os2/setup/extra.c:330 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6311) | xpinstall/wizard/os2/setup/extra.c:354 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6312) | xpinstall/wizard/os2/setup/extra.c:371 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6313) | xpinstall/wizard/os2/setup/extra.c:377 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6314) | xpinstall/wizard/os2/setup/extra.c:412 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6315) | xpinstall/wizard/os2/setup/extra.c:415 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6316) | xpinstall/wizard/os2/setup/extra.c:464 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6317) | xpinstall/wizard/os2/setup/extra.c:495 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6318) | xpinstall/wizard/os2/setup/extra.c:511 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6319) | xpinstall/wizard/os2/setup/extra.c:531 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6320) | xpinstall/wizard/os2/setup/extra.c:535 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6321) | xpinstall/wizard/os2/setup/extra.c:567 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6322) | xpinstall/wizard/os2/setup/extra.c:572 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6323) | xpinstall/wizard/os2/setup/extra.c:574 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6324) | xpinstall/wizard/os2/setup/extra.c:583 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6325) | xpinstall/wizard/os2/setup/extra.c:615 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6326) | xpinstall/wizard/os2/setup/extra.c:620 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6327) | xpinstall/wizard/os2/setup/extra.c:622 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6328) | xpinstall/wizard/os2/setup/extra.c:631 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6329) | xpinstall/wizard/os2/setup/extra.c:666 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6330) | xpinstall/wizard/os2/setup/extra.c:679 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6331) | xpinstall/wizard/os2/setup/extra.c:685 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6333) | xpinstall/wizard/os2/setup/extra.c:692 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6334) | xpinstall/wizard/os2/setup/extra.c:698 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6335) | xpinstall/wizard/os2/setup/extra.c:709 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6336) | xpinstall/wizard/os2/setup/extra.c:723 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6337) | xpinstall/wizard/os2/setup/extra.c:729 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6338) | xpinstall/wizard/os2/setup/extra.c:738 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6339) | xpinstall/wizard/os2/setup/extra.c:744 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6340) | xpinstall/wizard/os2/setup/extra.c:749 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6341) | xpinstall/wizard/os2/setup/extra.c:760 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6342) | xpinstall/wizard/os2/setup/extra.c:767 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6343) | xpinstall/wizard/os2/setup/extra.c:875 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6344) | xpinstall/wizard/os2/setup/extra.c:895 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6345) | xpinstall/wizard/os2/setup/extra.c:1008 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6346) | xpinstall/wizard/os2/setup/extra.c:1023 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6347) | xpinstall/wizard/os2/setup/extra.c:1031 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6348) | xpinstall/wizard/os2/setup/extra.c:1116 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6349) | xpinstall/wizard/os2/setup/extra.c:1187 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6350) | xpinstall/wizard/os2/setup/extra.c:1459 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6351) | xpinstall/wizard/os2/setup/extra.c:1466 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6352) | xpinstall/wizard/os2/setup/extra.c:1473 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6353) | xpinstall/wizard/os2/setup/extra.c:1509 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6354) | xpinstall/wizard/os2/setup/extra.c:1518 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6355) | xpinstall/wizard/os2/setup/extra.c:1574 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6356) | xpinstall/wizard/os2/setup/extra.c:1579 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6358) | xpinstall/wizard/os2/setup/extra.c:1605 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6359) | xpinstall/wizard/os2/setup/extra.c:1610 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6360) | xpinstall/wizard/os2/setup/extra.c:1765 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6361) | xpinstall/wizard/os2/setup/extra.c:2134 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6362) | xpinstall/wizard/os2/setup/extra.c:2476 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6363) | xpinstall/wizard/os2/setup/extra.c:2491 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6364) | xpinstall/wizard/os2/setup/extra.c:3078 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6365) | xpinstall/wizard/os2/setup/extra.c:3084 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6366) | xpinstall/wizard/os2/setup/extra.c:3161 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6367) | xpinstall/wizard/os2/setup/extra.c:3209 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6368) | xpinstall/wizard/os2/setup/extra.c:3211 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6369) | xpinstall/wizard/os2/setup/extra.c:3219 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6370) | xpinstall/wizard/os2/setup/extra.c:3220 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6371) | xpinstall/wizard/os2/setup/extra.c:3237 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6372) | xpinstall/wizard/os2/setup/extra.c:3238 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6373) | xpinstall/wizard/os2/setup/extra.c:3265 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6374) | xpinstall/wizard/os2/setup/extra.c:3267 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6375) | xpinstall/wizard/os2/setup/extra.c:3336 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6376) | xpinstall/wizard/os2/setup/extra.c:3351 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6377) | xpinstall/wizard/os2/setup/extra.c:3572 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6378) | xpinstall/wizard/os2/setup/extra.c:3584 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6379) | xpinstall/wizard/os2/setup/extra.c:3588 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6380) | xpinstall/wizard/os2/setup/extra.c:3594 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6381) | xpinstall/wizard/os2/setup/extra.c:3643 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6382) | xpinstall/wizard/os2/setup/extra.c:3668 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6383) | xpinstall/wizard/os2/setup/extra.c:3682 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6384) | xpinstall/wizard/os2/setup/extra.c:3734 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6385) | xpinstall/wizard/os2/setup/extra.c:3759 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6386) | xpinstall/wizard/os2/setup/extra.c:3822 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6387) | xpinstall/wizard/os2/setup/extra.c:3823 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6388) | xpinstall/wizard/os2/setup/extra.c:3824 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6389) | xpinstall/wizard/os2/setup/extra.c:3909 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6390) | xpinstall/wizard/os2/setup/extra.c:3950 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6391) | xpinstall/wizard/os2/setup/extra.c:4310 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6392) | xpinstall/wizard/os2/setup/extra.c:4313 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6393) | xpinstall/wizard/os2/setup/extra.c:4349 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6394) | xpinstall/wizard/os2/setup/extra.c:4354 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6395) | xpinstall/wizard/os2/setup/extra.c:4392 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6396) | xpinstall/wizard/os2/setup/extra.c:4412 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6397) | xpinstall/wizard/os2/setup/extra.c:4434 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6398) | xpinstall/wizard/os2/setup/extra.c:4467 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6399) | xpinstall/wizard/os2/setup/extra.c:4596 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6400) | xpinstall/wizard/os2/setup/extra.c:4772 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6401) | xpinstall/wizard/os2/setup/extra.c:4921 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6402) | xpinstall/wizard/os2/setup/extra.c:4953 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6403) | xpinstall/wizard/os2/setup/extra.c:4964 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6404) | xpinstall/wizard/os2/setup/extra.c:4982 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6405) | xpinstall/wizard/os2/setup/extra.c:4994 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6406) | xpinstall/wizard/os2/setup/extra.c:5000 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6407) | xpinstall/wizard/os2/setup/extra.c:5369 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6408) | xpinstall/wizard/os2/setup/extra.c:5430 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6409) | xpinstall/wizard/os2/setup/extra.c:5511 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6410) | xpinstall/wizard/os2/setup/extra.c:5524 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6411) | xpinstall/wizard/os2/setup/extra.c:5536 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6412) | xpinstall/wizard/os2/setup/extra.c:5548 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6413) | xpinstall/wizard/os2/setup/extra.c:5628 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6414) | xpinstall/wizard/os2/setup/extra.c:5635 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6415) | xpinstall/wizard/os2/setup/extra.c:5658 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6416) | xpinstall/wizard/os2/setup/extra.c:5671 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6417) | xpinstall/wizard/os2/setup/extra.c:5680 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6418) | xpinstall/wizard/os2/setup/extra.c:5689 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6419) | xpinstall/wizard/os2/setup/extra.c:5693 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6420) | xpinstall/wizard/os2/setup/extra.c:5710 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6421) | xpinstall/wizard/os2/setup/extra.c:5756 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6422) | xpinstall/wizard/os2/setup/extra.c:5788 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6423) | xpinstall/wizard/os2/setup/extra.c:5795 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6424) | xpinstall/wizard/os2/setup/extra.c:5797 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6425) | xpinstall/wizard/os2/setup/extra.c:5803 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6426) | xpinstall/wizard/os2/setup/extra.c:5807 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6427) | xpinstall/wizard/os2/setup/extra.c:5809 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6428) | xpinstall/wizard/os2/setup/extra.c:5814 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6429) | xpinstall/wizard/os2/setup/extra.c:5816 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6430) | xpinstall/wizard/os2/setup/extra.c:5835 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6431) | xpinstall/wizard/os2/setup/extra.c:5838 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6432) | xpinstall/wizard/os2/setup/extra.c:5845 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6434) | xpinstall/wizard/os2/setup/extra.c:5913 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6435) | xpinstall/wizard/os2/setup/extra.c:5962 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6437) | xpinstall/wizard/os2/setup/extra.c:5996 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6438) | xpinstall/wizard/os2/setup/extra.c:6016 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6439) | xpinstall/wizard/os2/setup/extra.c:6034 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6440) | xpinstall/wizard/os2/setup/extra.c:6052 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6441) | xpinstall/wizard/os2/setup/extra.c:6070 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6442) | xpinstall/wizard/os2/setup/extra.c:6088 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6443) | xpinstall/wizard/os2/setup/extra.c:6113 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6444) | xpinstall/wizard/os2/setup/extra.c:6180 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6445) | xpinstall/wizard/os2/setup/extra.c:6250 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6446) | xpinstall/wizard/os2/setup/extra.c:6301 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6447) | xpinstall/wizard/os2/setup/extra.c:6342 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6448) | xpinstall/wizard/os2/setup/extra.c:6346 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6449) | xpinstall/wizard/os2/setup/extra.c:6361 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6451) | xpinstall/wizard/os2/setup/extra.c:6389 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6454) | xpinstall/wizard/os2/setup/extra.c:417 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6455) | xpinstall/wizard/os2/setup/extra.c:533 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6456) | xpinstall/wizard/os2/setup/extra.c:537 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6457) | xpinstall/wizard/os2/setup/extra.c:569 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6458) | xpinstall/wizard/os2/setup/extra.c:576 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6459) | xpinstall/wizard/os2/setup/extra.c:617 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6460) | xpinstall/wizard/os2/setup/extra.c:624 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6461) | xpinstall/wizard/os2/setup/extra.c:668 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6462) | xpinstall/wizard/os2/setup/extra.c:700 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6463) | xpinstall/wizard/os2/setup/extra.c:731 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6464) | xpinstall/wizard/os2/setup/extra.c:751 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6465) | xpinstall/wizard/os2/setup/extra.c:877 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6466) | xpinstall/wizard/os2/setup/extra.c:1010 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6467) | xpinstall/wizard/os2/setup/extra.c:1033 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6468) | xpinstall/wizard/os2/setup/extra.c:1039 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6469) | xpinstall/wizard/os2/setup/extra.c:1120 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6470) | xpinstall/wizard/os2/setup/extra.c:1150 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6471) | xpinstall/wizard/os2/setup/extra.c:1189 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6472) | xpinstall/wizard/os2/setup/extra.c:1576 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6473) | xpinstall/wizard/os2/setup/extra.c:1581 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6474) | xpinstall/wizard/os2/setup/extra.c:1586 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6475) | xpinstall/wizard/os2/setup/extra.c:1612 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6476) | xpinstall/wizard/os2/setup/extra.c:1649 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6477) | xpinstall/wizard/os2/setup/extra.c:1656 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6478) | xpinstall/wizard/os2/setup/extra.c:1766 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6479) | xpinstall/wizard/os2/setup/extra.c:2519 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6480) | xpinstall/wizard/os2/setup/extra.c:3112 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6481) | xpinstall/wizard/os2/setup/extra.c:3555 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6482) | xpinstall/wizard/os2/setup/extra.c:3561 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6483) | xpinstall/wizard/os2/setup/extra.c:3635 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6485) | xpinstall/wizard/os2/setup/extra.c:3660 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6486) | xpinstall/wizard/os2/setup/extra.c:3677 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6487) | xpinstall/wizard/os2/setup/extra.c:3695 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6489) | xpinstall/wizard/os2/setup/extra.c:3736 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6490) | xpinstall/wizard/os2/setup/extra.c:3746 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6491) | xpinstall/wizard/os2/setup/extra.c:3747 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6492) | xpinstall/wizard/os2/setup/extra.c:3780 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6493) | xpinstall/wizard/os2/setup/extra.c:3781 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6494) | xpinstall/wizard/os2/setup/extra.c:3808 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6495) | xpinstall/wizard/os2/setup/extra.c:3809 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6496) | xpinstall/wizard/os2/setup/extra.c:3810 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6497) | xpinstall/wizard/os2/setup/extra.c:3836 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6498) | xpinstall/wizard/os2/setup/extra.c:3837 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6499) | xpinstall/wizard/os2/setup/extra.c:3838 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6500) | xpinstall/wizard/os2/setup/extra.c:3914 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6501) | xpinstall/wizard/os2/setup/extra.c:3915 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6502) | xpinstall/wizard/os2/setup/extra.c:3919 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6503) | xpinstall/wizard/os2/setup/extra.c:3955 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6504) | xpinstall/wizard/os2/setup/extra.c:3956 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6506) | xpinstall/wizard/os2/setup/extra.c:3995 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6507) | xpinstall/wizard/os2/setup/extra.c:3997 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6508) | xpinstall/wizard/os2/setup/extra.c:4017 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6509) | xpinstall/wizard/os2/setup/extra.c:4019 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6510) | xpinstall/wizard/os2/setup/extra.c:4370 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6511) | xpinstall/wizard/os2/setup/extra.c:4372 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6512) | xpinstall/wizard/os2/setup/extra.c:4590 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6513) | xpinstall/wizard/os2/setup/extra.c:4776 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6514) | xpinstall/wizard/os2/setup/extra.c:4793 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6515) | xpinstall/wizard/os2/setup/extra.c:4839 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6516) | xpinstall/wizard/os2/setup/extra.c:4955 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6517) | xpinstall/wizard/os2/setup/extra.c:4957 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6518) | xpinstall/wizard/os2/setup/extra.c:4974 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6519) | xpinstall/wizard/os2/setup/extra.c:4976 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6520) | xpinstall/wizard/os2/setup/extra.c:5371 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6521) | xpinstall/wizard/os2/setup/extra.c:5431 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6522) | xpinstall/wizard/os2/setup/extra.c:5675 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6523) | xpinstall/wizard/os2/setup/extra.c:5684 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6524) | xpinstall/wizard/os2/setup/extra.c:5695 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6525) | xpinstall/wizard/os2/setup/extra.c:5798 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6526) | xpinstall/wizard/os2/setup/extra.c:5799 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6527) | xpinstall/wizard/os2/setup/extra.c:5810 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6528) | xpinstall/wizard/os2/setup/extra.c:5811 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6529) | xpinstall/wizard/os2/setup/extra.c:5833 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6530) | xpinstall/wizard/os2/setup/extra.c:5839 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6531) | xpinstall/wizard/os2/setup/extra.c:5840 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6532) | xpinstall/wizard/os2/setup/extra.c:5964 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6533) | xpinstall/wizard/os2/setup/extra.c:5982 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6534) | xpinstall/wizard/os2/setup/extra.c:5998 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6535) | xpinstall/wizard/os2/setup/extra.c:6018 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6536) | xpinstall/wizard/os2/setup/extra.c:6036 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6537) | xpinstall/wizard/os2/setup/extra.c:6054 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6538) | xpinstall/wizard/os2/setup/extra.c:6072 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6539) | xpinstall/wizard/os2/setup/extra.c:6090 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6540) | xpinstall/wizard/os2/setup/extra.c:6115 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6541) | xpinstall/wizard/os2/setup/extra.c:6182 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6542) | xpinstall/wizard/os2/setup/extra.c:6305 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6543) | xpinstall/wizard/os2/setup/extra.c:6312 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6544) | xpinstall/wizard/os2/setup/extra.c:6348 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6545) | xpinstall/wizard/os2/setup/extra.c:6363 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6546) | xpinstall/wizard/os2/setup/extra.c:6375 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6547) | xpinstall/wizard/os2/setup/extra.c:6391 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6548) | xpinstall/wizard/os2/setup/ifuncns.c:3403 Medium: srand: Standard random number generators should not be used to generate randomness used for security reasons. For security sensitive randomness a crytographic randomness generator that provides sufficient entropy should be used.
|
r6549) | xpinstall/wizard/os2/setup/ifuncns.c:37 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6550) | xpinstall/wizard/os2/setup/ifuncns.c:133 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6551) | xpinstall/wizard/os2/setup/ifuncns.c:134 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6552) | xpinstall/wizard/os2/setup/ifuncns.c:135 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6553) | xpinstall/wizard/os2/setup/ifuncns.c:136 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6554) | xpinstall/wizard/os2/setup/ifuncns.c:137 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6555) | xpinstall/wizard/os2/setup/ifuncns.c:138 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6557) | xpinstall/wizard/os2/setup/ifuncns.c:256 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6558) | xpinstall/wizard/os2/setup/ifuncns.c:257 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6559) | xpinstall/wizard/os2/setup/ifuncns.c:258 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6560) | xpinstall/wizard/os2/setup/ifuncns.c:259 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6561) | xpinstall/wizard/os2/setup/ifuncns.c:260 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6562) | xpinstall/wizard/os2/setup/ifuncns.c:298 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6563) | xpinstall/wizard/os2/setup/ifuncns.c:359 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6564) | xpinstall/wizard/os2/setup/ifuncns.c:360 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6565) | xpinstall/wizard/os2/setup/ifuncns.c:368 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6566) | xpinstall/wizard/os2/setup/ifuncns.c:369 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6567) | xpinstall/wizard/os2/setup/ifuncns.c:411 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6568) | xpinstall/wizard/os2/setup/ifuncns.c:422 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6569) | xpinstall/wizard/os2/setup/ifuncns.c:423 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6570) | xpinstall/wizard/os2/setup/ifuncns.c:424 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6571) | xpinstall/wizard/os2/setup/ifuncns.c:425 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6572) | xpinstall/wizard/os2/setup/ifuncns.c:451 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6573) | xpinstall/wizard/os2/setup/ifuncns.c:452 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6574) | xpinstall/wizard/os2/setup/ifuncns.c:478 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6575) | xpinstall/wizard/os2/setup/ifuncns.c:479 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6576) | xpinstall/wizard/os2/setup/ifuncns.c:480 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6577) | xpinstall/wizard/os2/setup/ifuncns.c:481 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6579) | xpinstall/wizard/os2/setup/ifuncns.c:564 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6580) | xpinstall/wizard/os2/setup/ifuncns.c:565 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6581) | xpinstall/wizard/os2/setup/ifuncns.c:566 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6582) | xpinstall/wizard/os2/setup/ifuncns.c:594 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6583) | xpinstall/wizard/os2/setup/ifuncns.c:595 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6584) | xpinstall/wizard/os2/setup/ifuncns.c:596 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6585) | xpinstall/wizard/os2/setup/ifuncns.c:597 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6586) | xpinstall/wizard/os2/setup/ifuncns.c:670 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6587) | xpinstall/wizard/os2/setup/ifuncns.c:671 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6588) | xpinstall/wizard/os2/setup/ifuncns.c:672 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6589) | xpinstall/wizard/os2/setup/ifuncns.c:673 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6590) | xpinstall/wizard/os2/setup/ifuncns.c:674 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6591) | xpinstall/wizard/os2/setup/ifuncns.c:675 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6592) | xpinstall/wizard/os2/setup/ifuncns.c:676 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6593) | xpinstall/wizard/os2/setup/ifuncns.c:773 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6594) | xpinstall/wizard/os2/setup/ifuncns.c:774 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6595) | xpinstall/wizard/os2/setup/ifuncns.c:775 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6596) | xpinstall/wizard/os2/setup/ifuncns.c:776 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6597) | xpinstall/wizard/os2/setup/ifuncns.c:816 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6598) | xpinstall/wizard/os2/setup/ifuncns.c:817 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6599) | xpinstall/wizard/os2/setup/ifuncns.c:818 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6600) | xpinstall/wizard/os2/setup/ifuncns.c:819 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6601) | xpinstall/wizard/os2/setup/ifuncns.c:820 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6602) | xpinstall/wizard/os2/setup/ifuncns.c:848 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6603) | xpinstall/wizard/os2/setup/ifuncns.c:849 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6604) | xpinstall/wizard/os2/setup/ifuncns.c:882 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6605) | xpinstall/wizard/os2/setup/ifuncns.c:910 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6606) | xpinstall/wizard/os2/setup/ifuncns.c:911 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6607) | xpinstall/wizard/os2/setup/ifuncns.c:965 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6608) | xpinstall/wizard/os2/setup/ifuncns.c:996 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6609) | xpinstall/wizard/os2/setup/ifuncns.c:997 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6610) | xpinstall/wizard/os2/setup/ifuncns.c:998 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6611) | xpinstall/wizard/os2/setup/ifuncns.c:1025 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6612) | xpinstall/wizard/os2/setup/ifuncns.c:1026 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6613) | xpinstall/wizard/os2/setup/ifuncns.c:1074 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6615) | xpinstall/wizard/os2/setup/ifuncns.c:1076 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6616) | xpinstall/wizard/os2/setup/ifuncns.c:1102 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6617) | xpinstall/wizard/os2/setup/ifuncns.c:1158 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6618) | xpinstall/wizard/os2/setup/ifuncns.c:1159 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6619) | xpinstall/wizard/os2/setup/ifuncns.c:1160 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6620) | xpinstall/wizard/os2/setup/ifuncns.c:1189 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6621) | xpinstall/wizard/os2/setup/ifuncns.c:1190 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6622) | xpinstall/wizard/os2/setup/ifuncns.c:1191 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6623) | xpinstall/wizard/os2/setup/ifuncns.c:1192 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6624) | xpinstall/wizard/os2/setup/ifuncns.c:1193 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6625) | xpinstall/wizard/os2/setup/ifuncns.c:1273 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6626) | xpinstall/wizard/os2/setup/ifuncns.c:1274 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6627) | xpinstall/wizard/os2/setup/ifuncns.c:1275 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6628) | xpinstall/wizard/os2/setup/ifuncns.c:1276 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6629) | xpinstall/wizard/os2/setup/ifuncns.c:1277 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6630) | xpinstall/wizard/os2/setup/ifuncns.c:1278 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6631) | xpinstall/wizard/os2/setup/ifuncns.c:1348 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6632) | xpinstall/wizard/os2/setup/ifuncns.c:1349 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6633) | xpinstall/wizard/os2/setup/ifuncns.c:1350 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6634) | xpinstall/wizard/os2/setup/ifuncns.c:1351 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6635) | xpinstall/wizard/os2/setup/ifuncns.c:1352 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6636) | xpinstall/wizard/os2/setup/ifuncns.c:1353 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6637) | xpinstall/wizard/os2/setup/ifuncns.c:1355 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6638) | xpinstall/wizard/os2/setup/ifuncns.c:1356 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6639) | xpinstall/wizard/os2/setup/ifuncns.c:1357 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6640) | xpinstall/wizard/os2/setup/ifuncns.c:1358 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6641) | xpinstall/wizard/os2/setup/ifuncns.c:1359 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6642) | xpinstall/wizard/os2/setup/ifuncns.c:1360 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6643) | xpinstall/wizard/os2/setup/ifuncns.c:1361 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6644) | xpinstall/wizard/os2/setup/ifuncns.c:1487 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6645) | xpinstall/wizard/os2/setup/ifuncns.c:1488 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6646) | xpinstall/wizard/os2/setup/ifuncns.c:1489 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6647) | xpinstall/wizard/os2/setup/ifuncns.c:1542 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6648) | xpinstall/wizard/os2/setup/ifuncns.c:1543 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6649) | xpinstall/wizard/os2/setup/ifuncns.c:1544 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6650) | xpinstall/wizard/os2/setup/ifuncns.c:1545 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6651) | xpinstall/wizard/os2/setup/ifuncns.c:1546 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6652) | xpinstall/wizard/os2/setup/ifuncns.c:1547 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6653) | xpinstall/wizard/os2/setup/ifuncns.c:1548 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6654) | xpinstall/wizard/os2/setup/ifuncns.c:1588 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6655) | xpinstall/wizard/os2/setup/ifuncns.c:1589 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6656) | xpinstall/wizard/os2/setup/ifuncns.c:1590 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6657) | xpinstall/wizard/os2/setup/ifuncns.c:125 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6658) | xpinstall/wizard/os2/setup/ifuncns.c:144 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6659) | xpinstall/wizard/os2/setup/ifuncns.c:277 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6660) | xpinstall/wizard/os2/setup/ifuncns.c:318 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6661) | xpinstall/wizard/os2/setup/ifuncns.c:385 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6662) | xpinstall/wizard/os2/setup/ifuncns.c:389 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6663) | xpinstall/wizard/os2/setup/ifuncns.c:503 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6665) | xpinstall/wizard/os2/setup/ifuncns.c:537 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6666) | xpinstall/wizard/os2/setup/ifuncns.c:604 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6667) | xpinstall/wizard/os2/setup/ifuncns.c:635 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6668) | xpinstall/wizard/os2/setup/ifuncns.c:640 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6669) | xpinstall/wizard/os2/setup/ifuncns.c:686 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6671) | xpinstall/wizard/os2/setup/ifuncns.c:702 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6672) | xpinstall/wizard/os2/setup/ifuncns.c:703 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6673) | xpinstall/wizard/os2/setup/ifuncns.c:708 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6674) | xpinstall/wizard/os2/setup/ifuncns.c:709 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6676) | xpinstall/wizard/os2/setup/ifuncns.c:736 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6677) | xpinstall/wizard/os2/setup/ifuncns.c:752 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6678) | xpinstall/wizard/os2/setup/ifuncns.c:853 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6679) | xpinstall/wizard/os2/setup/ifuncns.c:858 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6680) | xpinstall/wizard/os2/setup/ifuncns.c:886 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6681) | xpinstall/wizard/os2/setup/ifuncns.c:891 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6682) | xpinstall/wizard/os2/setup/ifuncns.c:915 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6683) | xpinstall/wizard/os2/setup/ifuncns.c:1052 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6684) | xpinstall/wizard/os2/setup/ifuncns.c:1110 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6685) | xpinstall/wizard/os2/setup/ifuncns.c:1126 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6686) | xpinstall/wizard/os2/setup/ifuncns.c:1296 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6687) | xpinstall/wizard/os2/setup/ifuncns.c:1304 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6688) | xpinstall/wizard/os2/setup/ifuncns.c:1312 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6689) | xpinstall/wizard/os2/setup/ifuncns.c:1381 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6690) | xpinstall/wizard/os2/setup/ifuncns.c:1459 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6691) | xpinstall/wizard/os2/setup/ifuncns.c:1461 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6692) | xpinstall/wizard/os2/setup/ifuncns.c:1469 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6693) | xpinstall/wizard/os2/setup/ifuncns.c:148 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6694) | xpinstall/wizard/os2/setup/ifuncns.c:281 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6695) | xpinstall/wizard/os2/setup/ifuncns.c:506 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6696) | xpinstall/wizard/os2/setup/ifuncns.c:534 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6697) | xpinstall/wizard/os2/setup/ifuncns.c:539 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6698) | xpinstall/wizard/os2/setup/ifuncns.c:606 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6699) | xpinstall/wizard/os2/setup/ifuncns.c:637 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6700) | xpinstall/wizard/os2/setup/ifuncns.c:642 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6701) | xpinstall/wizard/os2/setup/ifuncns.c:688 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6703) | xpinstall/wizard/os2/setup/ifuncns.c:754 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6704) | xpinstall/wizard/os2/setup/ifuncns.c:756 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6705) | xpinstall/wizard/os2/setup/ifuncns.c:761 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6706) | xpinstall/wizard/os2/setup/ifuncns.c:860 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6707) | xpinstall/wizard/os2/setup/ifuncns.c:865 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6708) | xpinstall/wizard/os2/setup/ifuncns.c:893 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6709) | xpinstall/wizard/os2/setup/ifuncns.c:898 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6710) | xpinstall/wizard/os2/setup/ifuncns.c:919 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6711) | xpinstall/wizard/os2/setup/ifuncns.c:924 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6713) | xpinstall/wizard/os2/setup/ifuncns.c:1128 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6714) | xpinstall/wizard/os2/setup/ifuncns.c:1242 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6715) | xpinstall/wizard/os2/setup/ifuncns.c:1383 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6716) | xpinstall/wizard/os2/setup/ifuncns.c:1399 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6717) | xpinstall/wizard/os2/setup/ifuncns.c:1408 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6718) | xpinstall/wizard/os2/setup/ifuncns.c:1417 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6719) | xpinstall/wizard/os2/setup/ifuncns.c:1425 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6720) | xpinstall/wizard/os2/setup/ifuncns.c:1434 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6721) | xpinstall/wizard/os2/setup/ifuncns.c:1444 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6722) | xpinstall/wizard/os2/setup/ifuncns.c:1453 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6723) | xpinstall/wizard/os2/setup/ifuncns.c:1463 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6724) | xpinstall/wizard/os2/setup/ifuncns.c:1471 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6725) | xpinstall/wizard/os2/setup/ifuncns.c:376 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
|
r6726) | xpinstall/wizard/os2/setup/ifuncns.c:456 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
|
r6727) | xpinstall/wizard/os2/setup/ifuncns.c:1594 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
|
r6728) | xpinstall/wizard/os2/setup/logging.c:376 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6729) | xpinstall/wizard/os2/setup/logging.c:456 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6730) | xpinstall/wizard/os2/setup/logging.c:1594 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6731) | xpinstall/wizard/os2/setup/logging.c:51 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6732) | xpinstall/wizard/os2/setup/logging.c:523 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6733) | xpinstall/wizard/os2/setup/setup.c:59 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6734) | xpinstall/wizard/os2/setup/setup.c:76 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6735) | xpinstall/wizard/os2/setup/setup.c:107 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6736) | xpinstall/wizard/os2/setup/setup.c:118 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6737) | xpinstall/wizard/os2/setup/setup.c:148 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6738) | xpinstall/wizard/os2/setup/setup.c:189 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6739) | xpinstall/wizard/os2/setup/setup.c:190 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6740) | xpinstall/wizard/os2/setup/setup.c:246 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6741) | xpinstall/wizard/os2/setup/setup.c:247 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6742) | xpinstall/wizard/os2/setup/setup.c:266 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6743) | xpinstall/wizard/os2/setup/setup.c:302 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6744) | xpinstall/wizard/os2/setup/setup.c:330 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6745) | xpinstall/wizard/os2/setup/setup.c:342 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6746) | xpinstall/wizard/os2/setup/setup.c:350 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6747) | xpinstall/wizard/os2/setup/setup.c:351 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6748) | xpinstall/wizard/os2/setup/setup.c:360 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6749) | xpinstall/wizard/os2/setup/setup.c:372 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6750) | xpinstall/wizard/os2/setup/setup.c:380 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6751) | xpinstall/wizard/os2/setup/setup.c:388 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6752) | xpinstall/wizard/os2/setup/setup.c:402 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6753) | xpinstall/wizard/os2/setup/setup.c:403 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6754) | xpinstall/wizard/os2/setup/setup.c:404 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6755) | xpinstall/wizard/os2/setup/setup.c:433 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6756) | xpinstall/wizard/os2/setup/setup.c:445 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6757) | xpinstall/wizard/os2/setup/setup.c:446 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6758) | xpinstall/wizard/os2/setup/setup.c:472 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6759) | xpinstall/wizard/os2/setup/setup.c:473 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6760) | xpinstall/wizard/os2/setup/setup.c:492 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6761) | xpinstall/wizard/os2/setup/setup.c:503 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6762) | xpinstall/wizard/os2/setup/setup.c:514 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6763) | xpinstall/wizard/os2/setup/setup.c:535 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6764) | xpinstall/wizard/os2/setup/setup.c:558 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6765) | xpinstall/wizard/os2/setup/setup.c:109 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6766) | xpinstall/wizard/os2/setup/setup.c:137 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6768) | xpinstall/wizard/os2/setup/setup.c:141 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
|
r6769) | xpinstall/wizard/os2/setup/setup.c:152 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
|
r6770) | xpinstall/wizard/os2/setup/xpi.c:141 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6771) | xpinstall/wizard/os2/setup/xpi.c:152 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6772) | xpinstall/wizard/os2/setup/xpi.c:63 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6773) | xpinstall/wizard/os2/setup/xpi.c:64 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6774) | xpinstall/wizard/os2/setup/xpi.c:65 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6775) | xpinstall/wizard/os2/setup/xpi.c:157 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6776) | xpinstall/wizard/os2/setup/xpi.c:187 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6777) | xpinstall/wizard/os2/setup/xpi.c:188 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6778) | xpinstall/wizard/os2/setup/xpi.c:189 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6779) | xpinstall/wizard/os2/setup/xpi.c:190 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6780) | xpinstall/wizard/os2/setup/xpi.c:191 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6781) | xpinstall/wizard/os2/setup/xpi.c:253 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6782) | xpinstall/wizard/os2/setup/xpi.c:285 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6783) | xpinstall/wizard/os2/setup/xpi.c:340 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6784) | xpinstall/wizard/os2/setup/xpi.c:75 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6785) | xpinstall/wizard/os2/setup/xpi.c:87 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6786) | xpinstall/wizard/os2/setup/xpi.c:171 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6787) | xpinstall/wizard/os2/setup/xpi.c:208 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6788) | xpinstall/wizard/os2/setup/xpi.c:238 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6789) | xpinstall/wizard/os2/setup/xpi.c:243 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6790) | xpinstall/wizard/os2/setup/xpi.c:248 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6797) | xpinstall/wizard/os2/setup/xpi.c:97 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6798) | xpinstall/wizard/os2/setup/xpi.c:103 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6799) | xpinstall/wizard/os2/setup/xpi.c:109 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6800) | xpinstall/wizard/os2/setup/xpi.c:115 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6801) | xpinstall/wizard/os2/setup/xpi.c:257 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6802) | xpinstall/wizard/os2/setup/xpi.c:271 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6803) | xpinstall/wizard/os2/setup/setup.h:212 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6804) | xpinstall/wizard/os2/setup/setup.h:240 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6805) | xpinstall/wizard/os2/setup/setup.h:245 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6806) | xpinstall/wizard/os2/setup/setup.h:250 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6807) | xpinstall/wizard/os2/test/testxpi.c:454 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6808) | xpinstall/wizard/os2/test/testxpi.c:455 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6809) | xpinstall/wizard/os2/test/testxpi.c:456 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6810) | xpinstall/wizard/os2/test/testxpi.c:457 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6811) | xpinstall/wizard/os2/test/testxpi.c:458 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6812) | xpinstall/wizard/os2/test/testxpi.c:459 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6813) | xpinstall/wizard/os2/test/testxpi.c:460 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6814) | xpinstall/wizard/os2/test/testxpi.c:461 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6815) | xpinstall/wizard/os2/test/testxpi.c:462 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6816) | xpinstall/wizard/os2/test/testxpi.c:463 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6817) | xpinstall/wizard/os2/test/testxpi.c:464 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6818) | xpinstall/wizard/os2/test/testxpi.c:465 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6819) | xpinstall/wizard/os2/test/testxpi.c:466 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6820) | xpinstall/wizard/os2/test/testxpi.c:467 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6821) | xpinstall/wizard/os2/test/testxpi.c:468 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6822) | xpinstall/wizard/os2/test/testxpi.c:469 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6823) | xpinstall/wizard/os2/test/testxpi.c:470 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6824) | xpinstall/wizard/os2/test/testxpi.c:471 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6825) | xpinstall/wizard/os2/test/testxpi.c:472 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6826) | xpinstall/wizard/os2/test/testxpi.c:473 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6827) | xpinstall/wizard/os2/test/testxpi.c:474 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6828) | xpinstall/wizard/os2/test/testxpi.c:475 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6829) | xpinstall/wizard/os2/test/testxpi.c:476 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6830) | xpinstall/wizard/os2/test/testxpi.c:477 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6831) | xpinstall/wizard/os2/test/testxpi.c:478 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6832) | xpinstall/wizard/os2/test/testxpi.c:479 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6833) | xpinstall/wizard/os2/test/testxpi.c:480 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6834) | xpinstall/wizard/os2/test/testxpi.c:481 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6835) | xpinstall/wizard/os2/test/testxpi.c:482 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6836) | xpinstall/wizard/os2/test/testxpi.c:483 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6837) | xpinstall/wizard/os2/test/testxpi.c:484 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6838) | xpinstall/wizard/os2/test/testxpi.c:485 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6839) | xpinstall/wizard/os2/test/testxpi.c:486 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6840) | xpinstall/wizard/os2/test/testxpi.c:487 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6841) | xpinstall/wizard/os2/test/testxpi.c:488 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6842) | xpinstall/wizard/os2/test/testxpi.c:489 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6843) | xpinstall/wizard/os2/test/testxpi.c:490 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6844) | xpinstall/wizard/os2/test/testxpi.c:491 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6845) | xpinstall/wizard/os2/test/testxpi.c:492 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6846) | xpinstall/wizard/os2/test/testxpi.c:493 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6847) | xpinstall/wizard/os2/test/testxpi.c:494 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6848) | xpinstall/wizard/os2/test/testxpi.c:495 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6849) | xpinstall/wizard/os2/test/testxpi.c:496 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6850) | xpinstall/wizard/os2/test/testxpi.c:497 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6851) | xpinstall/wizard/os2/test/testxpi.c:498 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6852) | xpinstall/wizard/os2/test/testxpi.c:505 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6853) | xpinstall/wizard/os2/test/testxpi.c:506 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6854) | xpinstall/wizard/os2/test/testxpi.c:522 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6855) | xpinstall/wizard/os2/test/testxpi.c:49 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6856) | xpinstall/wizard/os2/test/xpi.c:81 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6857) | xpinstall/wizard/os2/test/xpi.c:149 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6858) | xpinstall/wizard/os2/test/xpi.c:155 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6859) | xpinstall/wizard/os2/test/xpi.c:164 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6860) | xpinstall/wizard/os2/test/xpi.c:171 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6861) | xpinstall/wizard/os2/uninstall/nsINIParser.cpp:42 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6862) | xpinstall/wizard/os2/uninstall/nsINIParser.cpp:43 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6863) | xpinstall/wizard/os2/uninstall/nsINIParser.cpp:105 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6864) | xpinstall/wizard/os2/uninstall/nsINIParser.cpp:161 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6865) | xpinstall/wizard/os2/uninstall/nsINIParser.cpp:41 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6866) | xpinstall/wizard/os2/uninstall/nsINIParser.cpp:71 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6867) | xpinstall/wizard/os2/uninstall/nsINIParser.cpp:263 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6868) | xpinstall/wizard/os2/uninstall/nsINIParser.cpp:172 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6869) | xpinstall/wizard/os2/uninstall/nsINIParser.cpp:247 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6870) | xpinstall/wizard/os2/uninstall/nsINIParser.cpp:262 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6871) | xpinstall/wizard/os2/uninstall/nsINIParser.cpp:249 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6872) | xpinstall/wizard/os2/uninstall/nsINIParser.cpp:251 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6873) | xpinstall/wizard/os2/uninstall/nsINIParser.cpp:265 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6874) | xpinstall/wizard/os2/uninstall/nsINIParser.cpp:266 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6875) | xpinstall/wizard/os2/uninstall/dialogs.c:252 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
|
r6876) | xpinstall/wizard/os2/uninstall/dialogs.c:34 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6877) | xpinstall/wizard/os2/uninstall/dialogs.c:35 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6878) | xpinstall/wizard/os2/uninstall/dialogs.c:78 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6879) | xpinstall/wizard/os2/uninstall/dialogs.c:130 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6880) | xpinstall/wizard/os2/uninstall/dialogs.c:270 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6881) | xpinstall/wizard/os2/uninstall/dialogs.c:291 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6882) | xpinstall/wizard/os2/uninstall/dialogs.c:299 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6883) | xpinstall/wizard/os2/uninstall/dialogs.c:58 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6884) | xpinstall/wizard/os2/uninstall/dialogs.c:60 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6885) | xpinstall/wizard/os2/uninstall/dialogs.c:87 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
|
r6886) | xpinstall/wizard/os2/uninstall/dialogs.c:303 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
|
r6887) | xpinstall/wizard/os2/uninstall/extra.c:87 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6888) | xpinstall/wizard/os2/uninstall/extra.c:303 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6889) | xpinstall/wizard/os2/uninstall/extra.c:53 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6890) | xpinstall/wizard/os2/uninstall/extra.c:101 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6891) | xpinstall/wizard/os2/uninstall/extra.c:121 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6892) | xpinstall/wizard/os2/uninstall/extra.c:138 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6893) | xpinstall/wizard/os2/uninstall/extra.c:238 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6894) | xpinstall/wizard/os2/uninstall/extra.c:258 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6895) | xpinstall/wizard/os2/uninstall/extra.c:751 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6896) | xpinstall/wizard/os2/uninstall/extra.c:752 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6897) | xpinstall/wizard/os2/uninstall/extra.c:756 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6898) | xpinstall/wizard/os2/uninstall/extra.c:802 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6899) | xpinstall/wizard/os2/uninstall/extra.c:803 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6900) | xpinstall/wizard/os2/uninstall/extra.c:804 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6901) | xpinstall/wizard/os2/uninstall/extra.c:805 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6902) | xpinstall/wizard/os2/uninstall/extra.c:806 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6903) | xpinstall/wizard/os2/uninstall/extra.c:807 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6904) | xpinstall/wizard/os2/uninstall/extra.c:808 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6905) | xpinstall/wizard/os2/uninstall/extra.c:960 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6906) | xpinstall/wizard/os2/uninstall/extra.c:961 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6907) | xpinstall/wizard/os2/uninstall/extra.c:984 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6908) | xpinstall/wizard/os2/uninstall/extra.c:985 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6909) | xpinstall/wizard/os2/uninstall/extra.c:986 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6910) | xpinstall/wizard/os2/uninstall/extra.c:987 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6911) | xpinstall/wizard/os2/uninstall/extra.c:988 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6912) | xpinstall/wizard/os2/uninstall/extra.c:989 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6913) | xpinstall/wizard/os2/uninstall/extra.c:1029 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6914) | xpinstall/wizard/os2/uninstall/extra.c:1030 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6915) | xpinstall/wizard/os2/uninstall/extra.c:1031 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6916) | xpinstall/wizard/os2/uninstall/extra.c:1032 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6917) | xpinstall/wizard/os2/uninstall/extra.c:1033 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6918) | xpinstall/wizard/os2/uninstall/extra.c:1034 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6919) | xpinstall/wizard/os2/uninstall/extra.c:1035 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6920) | xpinstall/wizard/os2/uninstall/extra.c:1116 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6921) | xpinstall/wizard/os2/uninstall/extra.c:1117 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6922) | xpinstall/wizard/os2/uninstall/extra.c:1118 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6923) | xpinstall/wizard/os2/uninstall/extra.c:1119 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6924) | xpinstall/wizard/os2/uninstall/extra.c:1196 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6925) | xpinstall/wizard/os2/uninstall/extra.c:1225 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6926) | xpinstall/wizard/os2/uninstall/extra.c:1226 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6927) | xpinstall/wizard/os2/uninstall/extra.c:1227 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6928) | xpinstall/wizard/os2/uninstall/extra.c:1228 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6929) | xpinstall/wizard/os2/uninstall/extra.c:1229 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6930) | xpinstall/wizard/os2/uninstall/extra.c:1321 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6935) | xpinstall/wizard/os2/uninstall/extra.c:111 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6936) | xpinstall/wizard/os2/uninstall/extra.c:128 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6937) | xpinstall/wizard/os2/uninstall/extra.c:264 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6938) | xpinstall/wizard/os2/uninstall/extra.c:1016 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
|
r6939) | xpinstall/wizard/os2/uninstall/extra.c:161 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6940) | xpinstall/wizard/os2/uninstall/extra.c:189 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6941) | xpinstall/wizard/os2/uninstall/extra.c:196 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6942) | xpinstall/wizard/os2/uninstall/extra.c:204 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6943) | xpinstall/wizard/os2/uninstall/extra.c:210 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6944) | xpinstall/wizard/os2/uninstall/extra.c:245 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6945) | xpinstall/wizard/os2/uninstall/extra.c:248 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6946) | xpinstall/wizard/os2/uninstall/extra.c:291 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6947) | xpinstall/wizard/os2/uninstall/extra.c:427 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6948) | xpinstall/wizard/os2/uninstall/extra.c:433 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6949) | xpinstall/wizard/os2/uninstall/extra.c:442 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6950) | xpinstall/wizard/os2/uninstall/extra.c:449 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6951) | xpinstall/wizard/os2/uninstall/extra.c:509 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6952) | xpinstall/wizard/os2/uninstall/extra.c:654 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6953) | xpinstall/wizard/os2/uninstall/extra.c:662 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6954) | xpinstall/wizard/os2/uninstall/extra.c:670 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6955) | xpinstall/wizard/os2/uninstall/extra.c:701 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6956) | xpinstall/wizard/os2/uninstall/extra.c:734 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6957) | xpinstall/wizard/os2/uninstall/extra.c:969 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6958) | xpinstall/wizard/os2/uninstall/extra.c:976 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6959) | xpinstall/wizard/os2/uninstall/extra.c:998 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6960) | xpinstall/wizard/os2/uninstall/extra.c:1003 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6961) | xpinstall/wizard/os2/uninstall/extra.c:1022 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6962) | xpinstall/wizard/os2/uninstall/extra.c:1040 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6963) | xpinstall/wizard/os2/uninstall/extra.c:1063 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6964) | xpinstall/wizard/os2/uninstall/extra.c:1077 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6965) | xpinstall/wizard/os2/uninstall/extra.c:1103 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6966) | xpinstall/wizard/os2/uninstall/extra.c:1152 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6967) | xpinstall/wizard/os2/uninstall/extra.c:1159 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6968) | xpinstall/wizard/os2/uninstall/extra.c:1182 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6969) | xpinstall/wizard/os2/uninstall/extra.c:1192 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6970) | xpinstall/wizard/os2/uninstall/extra.c:1207 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6971) | xpinstall/wizard/os2/uninstall/extra.c:1241 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6972) | xpinstall/wizard/os2/uninstall/extra.c:1273 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6973) | xpinstall/wizard/os2/uninstall/extra.c:1286 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6974) | xpinstall/wizard/os2/uninstall/extra.c:1289 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6975) | xpinstall/wizard/os2/uninstall/extra.c:1296 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6976) | xpinstall/wizard/os2/uninstall/extra.c:1300 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6977) | xpinstall/wizard/os2/uninstall/extra.c:1322 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6978) | xpinstall/wizard/os2/uninstall/extra.c:191 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6979) | xpinstall/wizard/os2/uninstall/extra.c:199 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6980) | xpinstall/wizard/os2/uninstall/extra.c:250 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6981) | xpinstall/wizard/os2/uninstall/extra.c:510 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6982) | xpinstall/wizard/os2/uninstall/extra.c:828 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6983) | xpinstall/wizard/os2/uninstall/extra.c:1013 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6984) | xpinstall/wizard/os2/uninstall/extra.c:1105 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6985) | xpinstall/wizard/os2/uninstall/extra.c:1284 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6986) | xpinstall/wizard/os2/uninstall/extra.c:1290 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6987) | xpinstall/wizard/os2/uninstall/extra.c:1291 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
|
r6990) | xpinstall/wizard/os2/uninstall/ifuncns.c:31 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6991) | xpinstall/wizard/os2/uninstall/ifuncns.c:32 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6992) | xpinstall/wizard/os2/uninstall/ifuncns.c:33 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6993) | xpinstall/wizard/os2/uninstall/ifuncns.c:34 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6994) | xpinstall/wizard/os2/uninstall/ifuncns.c:84 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6995) | xpinstall/wizard/os2/uninstall/ifuncns.c:85 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6996) | xpinstall/wizard/os2/uninstall/ifuncns.c:86 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6997) | xpinstall/wizard/os2/uninstall/ifuncns.c:87 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6998) | xpinstall/wizard/os2/uninstall/ifuncns.c:159 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|
r6999) | xpinstall/wizard/os2/uninstall/ifuncns.c:160 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
|