r6000)xpinstall/wizard/os2/setup/dialogs.c:2115 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6001)xpinstall/wizard/os2/setup/dialogs.c:227 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6002)xpinstall/wizard/os2/setup/dialogs.c:460 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6003)xpinstall/wizard/os2/setup/dialogs.c:486 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6004)xpinstall/wizard/os2/setup/dialogs.c:504 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6005)xpinstall/wizard/os2/setup/dialogs.c:524 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6006)xpinstall/wizard/os2/setup/dialogs.c:596 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6007)xpinstall/wizard/os2/setup/dialogs.c:687 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6008)xpinstall/wizard/os2/setup/dialogs.c:744 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6009)xpinstall/wizard/os2/setup/dialogs.c:746 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6010)xpinstall/wizard/os2/setup/dialogs.c:807 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6011)xpinstall/wizard/os2/setup/dialogs.c:857 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6012)xpinstall/wizard/os2/setup/dialogs.c:1127 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6013)xpinstall/wizard/os2/setup/dialogs.c:1201 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6014)xpinstall/wizard/os2/setup/dialogs.c:1205 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6015)xpinstall/wizard/os2/setup/dialogs.c:1267 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6016)xpinstall/wizard/os2/setup/dialogs.c:2010 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6017)xpinstall/wizard/os2/setup/dialogs.c:2361 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6018)xpinstall/wizard/os2/setup/dialogs.c:2381 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6019)xpinstall/wizard/os2/setup/dialogs.c:2391 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6020)xpinstall/wizard/os2/setup/extra.c:229 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6021)xpinstall/wizard/os2/setup/extra.c:429 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6022)xpinstall/wizard/os2/setup/extra.c:445 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6023)xpinstall/wizard/os2/setup/extra.c:689 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6024)xpinstall/wizard/os2/setup/extra.c:773 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6025)xpinstall/wizard/os2/setup/extra.c:791 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6026)xpinstall/wizard/os2/setup/extra.c:809 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6027)xpinstall/wizard/os2/setup/extra.c:1094 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6028)xpinstall/wizard/os2/setup/extra.c:1731 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6029)xpinstall/wizard/os2/setup/extra.c:1759 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6031)xpinstall/wizard/os2/setup/extra.c:1779 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6032)xpinstall/wizard/os2/setup/extra.c:1794 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6033)xpinstall/wizard/os2/setup/extra.c:1798 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6035)xpinstall/wizard/os2/setup/extra.c:1813 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6036)xpinstall/wizard/os2/setup/extra.c:1823 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6037)xpinstall/wizard/os2/setup/extra.c:1829 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6038)xpinstall/wizard/os2/setup/extra.c:2156 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6039)xpinstall/wizard/os2/setup/extra.c:2365 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6040)xpinstall/wizard/os2/setup/extra.c:2383 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6041)xpinstall/wizard/os2/setup/extra.c:2393 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6042)xpinstall/wizard/os2/setup/extra.c:65 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6043)xpinstall/wizard/os2/setup/extra.c:135 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6044)xpinstall/wizard/os2/setup/extra.c:155 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6045)xpinstall/wizard/os2/setup/extra.c:172 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6046)xpinstall/wizard/os2/setup/extra.c:183 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6047)xpinstall/wizard/os2/setup/extra.c:195 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6048)xpinstall/wizard/os2/setup/extra.c:196 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6049)xpinstall/wizard/os2/setup/extra.c:221 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6051)xpinstall/wizard/os2/setup/extra.c:244 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6052)xpinstall/wizard/os2/setup/extra.c:268 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6053)xpinstall/wizard/os2/setup/extra.c:269 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6054)xpinstall/wizard/os2/setup/extra.c:270 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6055)xpinstall/wizard/os2/setup/extra.c:304 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6056)xpinstall/wizard/os2/setup/extra.c:305 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6057)xpinstall/wizard/os2/setup/extra.c:328 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6058)xpinstall/wizard/os2/setup/extra.c:405 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6059)xpinstall/wizard/os2/setup/extra.c:426 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6060)xpinstall/wizard/os2/setup/extra.c:491 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6061)xpinstall/wizard/os2/setup/extra.c:492 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6062)xpinstall/wizard/os2/setup/extra.c:527 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6063)xpinstall/wizard/os2/setup/extra.c:528 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6064)xpinstall/wizard/os2/setup/extra.c:529 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6065)xpinstall/wizard/os2/setup/extra.c:543 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6066)xpinstall/wizard/os2/setup/extra.c:558 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6067)xpinstall/wizard/os2/setup/extra.c:559 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6068)xpinstall/wizard/os2/setup/extra.c:560 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6069)xpinstall/wizard/os2/setup/extra.c:561 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6070)xpinstall/wizard/os2/setup/extra.c:588 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6071)xpinstall/wizard/os2/setup/extra.c:606 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6072)xpinstall/wizard/os2/setup/extra.c:607 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6073)xpinstall/wizard/os2/setup/extra.c:608 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6074)xpinstall/wizard/os2/setup/extra.c:609 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6075)xpinstall/wizard/os2/setup/extra.c:636 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6076)xpinstall/wizard/os2/setup/extra.c:655 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6077)xpinstall/wizard/os2/setup/extra.c:656 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6079)xpinstall/wizard/os2/setup/extra.c:658 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6080)xpinstall/wizard/os2/setup/extra.c:777 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6081)xpinstall/wizard/os2/setup/extra.c:818 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6082)xpinstall/wizard/os2/setup/extra.c:819 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6083)xpinstall/wizard/os2/setup/extra.c:820 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6084)xpinstall/wizard/os2/setup/extra.c:830 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6085)xpinstall/wizard/os2/setup/extra.c:851 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6086)xpinstall/wizard/os2/setup/extra.c:852 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6087)xpinstall/wizard/os2/setup/extra.c:853 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6088)xpinstall/wizard/os2/setup/extra.c:854 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6089)xpinstall/wizard/os2/setup/extra.c:855 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6090)xpinstall/wizard/os2/setup/extra.c:856 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6091)xpinstall/wizard/os2/setup/extra.c:976 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6092)xpinstall/wizard/os2/setup/extra.c:997 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6093)xpinstall/wizard/os2/setup/extra.c:998 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6094)xpinstall/wizard/os2/setup/extra.c:999 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6095)xpinstall/wizard/os2/setup/extra.c:1000 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6096)xpinstall/wizard/os2/setup/extra.c:1001 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6097)xpinstall/wizard/os2/setup/extra.c:1002 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6098)xpinstall/wizard/os2/setup/extra.c:1043 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6099)xpinstall/wizard/os2/setup/extra.c:1074 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6100)xpinstall/wizard/os2/setup/extra.c:1075 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6101)xpinstall/wizard/os2/setup/extra.c:1076 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6102)xpinstall/wizard/os2/setup/extra.c:1077 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6103)xpinstall/wizard/os2/setup/extra.c:1103 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6104)xpinstall/wizard/os2/setup/extra.c:1104 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6105)xpinstall/wizard/os2/setup/extra.c:1174 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6106)xpinstall/wizard/os2/setup/extra.c:1175 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6107)xpinstall/wizard/os2/setup/extra.c:1176 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6108)xpinstall/wizard/os2/setup/extra.c:1177 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6109)xpinstall/wizard/os2/setup/extra.c:1178 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6110)xpinstall/wizard/os2/setup/extra.c:1179 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6111)xpinstall/wizard/os2/setup/extra.c:1294 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6112)xpinstall/wizard/os2/setup/extra.c:1559 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6113)xpinstall/wizard/os2/setup/extra.c:1560 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6114)xpinstall/wizard/os2/setup/extra.c:1596 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6115)xpinstall/wizard/os2/setup/extra.c:1597 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6116)xpinstall/wizard/os2/setup/extra.c:1598 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6117)xpinstall/wizard/os2/setup/extra.c:1688 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6118)xpinstall/wizard/os2/setup/extra.c:1689 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6119)xpinstall/wizard/os2/setup/extra.c:1703 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6120)xpinstall/wizard/os2/setup/extra.c:2094 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6121)xpinstall/wizard/os2/setup/extra.c:2472 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6122)xpinstall/wizard/os2/setup/extra.c:2473 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6123)xpinstall/wizard/os2/setup/extra.c:2487 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6124)xpinstall/wizard/os2/setup/extra.c:2488 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6125)xpinstall/wizard/os2/setup/extra.c:2509 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6126)xpinstall/wizard/os2/setup/extra.c:2510 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6127)xpinstall/wizard/os2/setup/extra.c:2511 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6128)xpinstall/wizard/os2/setup/extra.c:2512 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6129)xpinstall/wizard/os2/setup/extra.c:2513 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6130)xpinstall/wizard/os2/setup/extra.c:2514 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6131)xpinstall/wizard/os2/setup/extra.c:3076 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6132)xpinstall/wizard/os2/setup/extra.c:3093 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6133)xpinstall/wizard/os2/setup/extra.c:3094 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6134)xpinstall/wizard/os2/setup/extra.c:3107 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6135)xpinstall/wizard/os2/setup/extra.c:3131 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6136)xpinstall/wizard/os2/setup/extra.c:3132 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6137)xpinstall/wizard/os2/setup/extra.c:3133 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6138)xpinstall/wizard/os2/setup/extra.c:3134 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6139)xpinstall/wizard/os2/setup/extra.c:3135 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6140)xpinstall/wizard/os2/setup/extra.c:3136 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6141)xpinstall/wizard/os2/setup/extra.c:3137 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6142)xpinstall/wizard/os2/setup/extra.c:3138 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6143)xpinstall/wizard/os2/setup/extra.c:3139 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6144)xpinstall/wizard/os2/setup/extra.c:3140 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6145)xpinstall/wizard/os2/setup/extra.c:3191 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6146)xpinstall/wizard/os2/setup/extra.c:3192 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6147)xpinstall/wizard/os2/setup/extra.c:3193 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6148)xpinstall/wizard/os2/setup/extra.c:3250 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6149)xpinstall/wizard/os2/setup/extra.c:3251 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6150)xpinstall/wizard/os2/setup/extra.c:3252 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6151)xpinstall/wizard/os2/setup/extra.c:3333 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6152)xpinstall/wizard/os2/setup/extra.c:3349 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6153)xpinstall/wizard/os2/setup/extra.c:3429 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6154)xpinstall/wizard/os2/setup/extra.c:3430 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6155)xpinstall/wizard/os2/setup/extra.c:3431 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6156)xpinstall/wizard/os2/setup/extra.c:3432 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6157)xpinstall/wizard/os2/setup/extra.c:3433 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6158)xpinstall/wizard/os2/setup/extra.c:3483 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6159)xpinstall/wizard/os2/setup/extra.c:3484 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6160)xpinstall/wizard/os2/setup/extra.c:3485 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6161)xpinstall/wizard/os2/setup/extra.c:3531 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6162)xpinstall/wizard/os2/setup/extra.c:3532 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6163)xpinstall/wizard/os2/setup/extra.c:3533 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6164)xpinstall/wizard/os2/setup/extra.c:3534 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6165)xpinstall/wizard/os2/setup/extra.c:3535 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6166)xpinstall/wizard/os2/setup/extra.c:3536 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6167)xpinstall/wizard/os2/setup/extra.c:3537 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6168)xpinstall/wizard/os2/setup/extra.c:3538 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6169)xpinstall/wizard/os2/setup/extra.c:3539 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6170)xpinstall/wizard/os2/setup/extra.c:3705 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6171)xpinstall/wizard/os2/setup/extra.c:3706 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6172)xpinstall/wizard/os2/setup/extra.c:3707 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6173)xpinstall/wizard/os2/setup/extra.c:3726 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6174)xpinstall/wizard/os2/setup/extra.c:3727 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6175)xpinstall/wizard/os2/setup/extra.c:3728 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6176)xpinstall/wizard/os2/setup/extra.c:3729 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6177)xpinstall/wizard/os2/setup/extra.c:3730 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6178)xpinstall/wizard/os2/setup/extra.c:3731 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6179)xpinstall/wizard/os2/setup/extra.c:3791 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6180)xpinstall/wizard/os2/setup/extra.c:3792 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6181)xpinstall/wizard/os2/setup/extra.c:3793 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6182)xpinstall/wizard/os2/setup/extra.c:3794 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6183)xpinstall/wizard/os2/setup/extra.c:3795 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6184)xpinstall/wizard/os2/setup/extra.c:3796 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6185)xpinstall/wizard/os2/setup/extra.c:3797 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6186)xpinstall/wizard/os2/setup/extra.c:3848 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6187)xpinstall/wizard/os2/setup/extra.c:3906 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6188)xpinstall/wizard/os2/setup/extra.c:3947 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6189)xpinstall/wizard/os2/setup/extra.c:3982 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6190)xpinstall/wizard/os2/setup/extra.c:4295 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6191)xpinstall/wizard/os2/setup/extra.c:4296 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6192)xpinstall/wizard/os2/setup/extra.c:4297 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6195)xpinstall/wizard/os2/setup/extra.c:4331 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6196)xpinstall/wizard/os2/setup/extra.c:4387 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6197)xpinstall/wizard/os2/setup/extra.c:4484 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6198)xpinstall/wizard/os2/setup/extra.c:4485 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6199)xpinstall/wizard/os2/setup/extra.c:4489 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6200)xpinstall/wizard/os2/setup/extra.c:4562 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6201)xpinstall/wizard/os2/setup/extra.c:4563 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6202)xpinstall/wizard/os2/setup/extra.c:4564 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6203)xpinstall/wizard/os2/setup/extra.c:4565 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6204)xpinstall/wizard/os2/setup/extra.c:4566 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6205)xpinstall/wizard/os2/setup/extra.c:4567 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6206)xpinstall/wizard/os2/setup/extra.c:4568 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6207)xpinstall/wizard/os2/setup/extra.c:4569 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6208)xpinstall/wizard/os2/setup/extra.c:4570 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6209)xpinstall/wizard/os2/setup/extra.c:4744 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6210)xpinstall/wizard/os2/setup/extra.c:4745 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6211)xpinstall/wizard/os2/setup/extra.c:4746 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6212)xpinstall/wizard/os2/setup/extra.c:4747 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6213)xpinstall/wizard/os2/setup/extra.c:4816 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6214)xpinstall/wizard/os2/setup/extra.c:4817 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6215)xpinstall/wizard/os2/setup/extra.c:4822 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6216)xpinstall/wizard/os2/setup/extra.c:4823 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6217)xpinstall/wizard/os2/setup/extra.c:4824 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6218)xpinstall/wizard/os2/setup/extra.c:4870 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6219)xpinstall/wizard/os2/setup/extra.c:4871 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6220)xpinstall/wizard/os2/setup/extra.c:4872 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6221)xpinstall/wizard/os2/setup/extra.c:4873 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6222)xpinstall/wizard/os2/setup/extra.c:5305 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6223)xpinstall/wizard/os2/setup/extra.c:5327 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6224)xpinstall/wizard/os2/setup/extra.c:5419 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6225)xpinstall/wizard/os2/setup/extra.c:5420 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6227)xpinstall/wizard/os2/setup/extra.c:5448 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6228)xpinstall/wizard/os2/setup/extra.c:5474 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6229)xpinstall/wizard/os2/setup/extra.c:5475 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6230)xpinstall/wizard/os2/setup/extra.c:5476 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6231)xpinstall/wizard/os2/setup/extra.c:5477 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6232)xpinstall/wizard/os2/setup/extra.c:5478 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6233)xpinstall/wizard/os2/setup/extra.c:5580 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6234)xpinstall/wizard/os2/setup/extra.c:5581 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6235)xpinstall/wizard/os2/setup/extra.c:5582 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6236)xpinstall/wizard/os2/setup/extra.c:5583 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6237)xpinstall/wizard/os2/setup/extra.c:5584 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6238)xpinstall/wizard/os2/setup/extra.c:5585 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6239)xpinstall/wizard/os2/setup/extra.c:5699 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6240)xpinstall/wizard/os2/setup/extra.c:5714 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6241)xpinstall/wizard/os2/setup/extra.c:5739 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6242)xpinstall/wizard/os2/setup/extra.c:5740 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6243)xpinstall/wizard/os2/setup/extra.c:5741 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6244)xpinstall/wizard/os2/setup/extra.c:5742 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6245)xpinstall/wizard/os2/setup/extra.c:5743 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6246)xpinstall/wizard/os2/setup/extra.c:5744 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6247)xpinstall/wizard/os2/setup/extra.c:5858 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6248)xpinstall/wizard/os2/setup/extra.c:5912 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6249)xpinstall/wizard/os2/setup/extra.c:5957 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6250)xpinstall/wizard/os2/setup/extra.c:5975 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6252)xpinstall/wizard/os2/setup/extra.c:6011 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6253)xpinstall/wizard/os2/setup/extra.c:6029 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6254)xpinstall/wizard/os2/setup/extra.c:6047 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6255)xpinstall/wizard/os2/setup/extra.c:6065 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6256)xpinstall/wizard/os2/setup/extra.c:6083 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6257)xpinstall/wizard/os2/setup/extra.c:6102 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6258)xpinstall/wizard/os2/setup/extra.c:6164 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6259)xpinstall/wizard/os2/setup/extra.c:6175 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6260)xpinstall/wizard/os2/setup/extra.c:6176 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6261)xpinstall/wizard/os2/setup/extra.c:6203 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6262)xpinstall/wizard/os2/setup/extra.c:6245 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6263)xpinstall/wizard/os2/setup/extra.c:6297 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6264)xpinstall/wizard/os2/setup/extra.c:6323 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6265)xpinstall/wizard/os2/setup/extra.c:6324 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6266)xpinstall/wizard/os2/setup/extra.c:6325 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6267)xpinstall/wizard/os2/setup/extra.c:6326 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6268)xpinstall/wizard/os2/setup/extra.c:6327 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6269)xpinstall/wizard/os2/setup/extra.c:6356 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6289)xpinstall/wizard/os2/setup/extra.c:145 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6290)xpinstall/wizard/os2/setup/extra.c:162 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6291)xpinstall/wizard/os2/setup/extra.c:335 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6292)xpinstall/wizard/os2/setup/extra.c:430 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6294)xpinstall/wizard/os2/setup/extra.c:592 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6296)xpinstall/wizard/os2/setup/extra.c:839 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6297)xpinstall/wizard/os2/setup/extra.c:1048 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6298)xpinstall/wizard/os2/setup/extra.c:1108 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6299)xpinstall/wizard/os2/setup/extra.c:1601 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6300)xpinstall/wizard/os2/setup/extra.c:3113 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6301)xpinstall/wizard/os2/setup/extra.c:3170 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6303)xpinstall/wizard/os2/setup/extra.c:4833 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6304)xpinstall/wizard/os2/setup/extra.c:4841 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6305)xpinstall/wizard/os2/setup/extra.c:5313 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6306)xpinstall/wizard/os2/setup/extra.c:5340 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6307)xpinstall/wizard/os2/setup/extra.c:6208 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6308)xpinstall/wizard/os2/setup/extra.c:283 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6309)xpinstall/wizard/os2/setup/extra.c:289 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6310)xpinstall/wizard/os2/setup/extra.c:330 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6311)xpinstall/wizard/os2/setup/extra.c:354 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6312)xpinstall/wizard/os2/setup/extra.c:371 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6313)xpinstall/wizard/os2/setup/extra.c:377 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6314)xpinstall/wizard/os2/setup/extra.c:412 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6315)xpinstall/wizard/os2/setup/extra.c:415 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6316)xpinstall/wizard/os2/setup/extra.c:464 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6317)xpinstall/wizard/os2/setup/extra.c:495 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6318)xpinstall/wizard/os2/setup/extra.c:511 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6319)xpinstall/wizard/os2/setup/extra.c:531 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6320)xpinstall/wizard/os2/setup/extra.c:535 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6321)xpinstall/wizard/os2/setup/extra.c:567 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6322)xpinstall/wizard/os2/setup/extra.c:572 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6323)xpinstall/wizard/os2/setup/extra.c:574 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6324)xpinstall/wizard/os2/setup/extra.c:583 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6325)xpinstall/wizard/os2/setup/extra.c:615 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6326)xpinstall/wizard/os2/setup/extra.c:620 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6327)xpinstall/wizard/os2/setup/extra.c:622 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6328)xpinstall/wizard/os2/setup/extra.c:631 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6329)xpinstall/wizard/os2/setup/extra.c:666 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6330)xpinstall/wizard/os2/setup/extra.c:679 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6331)xpinstall/wizard/os2/setup/extra.c:685 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6333)xpinstall/wizard/os2/setup/extra.c:692 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6334)xpinstall/wizard/os2/setup/extra.c:698 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6335)xpinstall/wizard/os2/setup/extra.c:709 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6336)xpinstall/wizard/os2/setup/extra.c:723 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6337)xpinstall/wizard/os2/setup/extra.c:729 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6338)xpinstall/wizard/os2/setup/extra.c:738 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6339)xpinstall/wizard/os2/setup/extra.c:744 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6340)xpinstall/wizard/os2/setup/extra.c:749 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6341)xpinstall/wizard/os2/setup/extra.c:760 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6342)xpinstall/wizard/os2/setup/extra.c:767 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6343)xpinstall/wizard/os2/setup/extra.c:875 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6344)xpinstall/wizard/os2/setup/extra.c:895 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6345)xpinstall/wizard/os2/setup/extra.c:1008 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6346)xpinstall/wizard/os2/setup/extra.c:1023 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6347)xpinstall/wizard/os2/setup/extra.c:1031 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6348)xpinstall/wizard/os2/setup/extra.c:1116 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6349)xpinstall/wizard/os2/setup/extra.c:1187 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6350)xpinstall/wizard/os2/setup/extra.c:1459 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6351)xpinstall/wizard/os2/setup/extra.c:1466 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6352)xpinstall/wizard/os2/setup/extra.c:1473 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6353)xpinstall/wizard/os2/setup/extra.c:1509 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6354)xpinstall/wizard/os2/setup/extra.c:1518 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6355)xpinstall/wizard/os2/setup/extra.c:1574 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6356)xpinstall/wizard/os2/setup/extra.c:1579 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6358)xpinstall/wizard/os2/setup/extra.c:1605 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6359)xpinstall/wizard/os2/setup/extra.c:1610 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6360)xpinstall/wizard/os2/setup/extra.c:1765 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6361)xpinstall/wizard/os2/setup/extra.c:2134 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6362)xpinstall/wizard/os2/setup/extra.c:2476 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6363)xpinstall/wizard/os2/setup/extra.c:2491 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6364)xpinstall/wizard/os2/setup/extra.c:3078 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6365)xpinstall/wizard/os2/setup/extra.c:3084 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6366)xpinstall/wizard/os2/setup/extra.c:3161 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6367)xpinstall/wizard/os2/setup/extra.c:3209 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6368)xpinstall/wizard/os2/setup/extra.c:3211 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6369)xpinstall/wizard/os2/setup/extra.c:3219 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6370)xpinstall/wizard/os2/setup/extra.c:3220 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6371)xpinstall/wizard/os2/setup/extra.c:3237 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6372)xpinstall/wizard/os2/setup/extra.c:3238 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6373)xpinstall/wizard/os2/setup/extra.c:3265 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6374)xpinstall/wizard/os2/setup/extra.c:3267 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6375)xpinstall/wizard/os2/setup/extra.c:3336 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6376)xpinstall/wizard/os2/setup/extra.c:3351 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6377)xpinstall/wizard/os2/setup/extra.c:3572 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6378)xpinstall/wizard/os2/setup/extra.c:3584 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6379)xpinstall/wizard/os2/setup/extra.c:3588 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6380)xpinstall/wizard/os2/setup/extra.c:3594 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6381)xpinstall/wizard/os2/setup/extra.c:3643 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6382)xpinstall/wizard/os2/setup/extra.c:3668 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6383)xpinstall/wizard/os2/setup/extra.c:3682 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6384)xpinstall/wizard/os2/setup/extra.c:3734 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6385)xpinstall/wizard/os2/setup/extra.c:3759 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6386)xpinstall/wizard/os2/setup/extra.c:3822 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6387)xpinstall/wizard/os2/setup/extra.c:3823 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6388)xpinstall/wizard/os2/setup/extra.c:3824 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6389)xpinstall/wizard/os2/setup/extra.c:3909 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6390)xpinstall/wizard/os2/setup/extra.c:3950 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6391)xpinstall/wizard/os2/setup/extra.c:4310 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6392)xpinstall/wizard/os2/setup/extra.c:4313 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6393)xpinstall/wizard/os2/setup/extra.c:4349 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6394)xpinstall/wizard/os2/setup/extra.c:4354 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6395)xpinstall/wizard/os2/setup/extra.c:4392 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6396)xpinstall/wizard/os2/setup/extra.c:4412 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6397)xpinstall/wizard/os2/setup/extra.c:4434 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6398)xpinstall/wizard/os2/setup/extra.c:4467 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6399)xpinstall/wizard/os2/setup/extra.c:4596 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6400)xpinstall/wizard/os2/setup/extra.c:4772 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6401)xpinstall/wizard/os2/setup/extra.c:4921 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6402)xpinstall/wizard/os2/setup/extra.c:4953 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6403)xpinstall/wizard/os2/setup/extra.c:4964 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6404)xpinstall/wizard/os2/setup/extra.c:4982 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6405)xpinstall/wizard/os2/setup/extra.c:4994 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6406)xpinstall/wizard/os2/setup/extra.c:5000 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6407)xpinstall/wizard/os2/setup/extra.c:5369 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6408)xpinstall/wizard/os2/setup/extra.c:5430 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6409)xpinstall/wizard/os2/setup/extra.c:5511 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6410)xpinstall/wizard/os2/setup/extra.c:5524 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6411)xpinstall/wizard/os2/setup/extra.c:5536 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6412)xpinstall/wizard/os2/setup/extra.c:5548 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6413)xpinstall/wizard/os2/setup/extra.c:5628 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6414)xpinstall/wizard/os2/setup/extra.c:5635 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6415)xpinstall/wizard/os2/setup/extra.c:5658 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6416)xpinstall/wizard/os2/setup/extra.c:5671 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6417)xpinstall/wizard/os2/setup/extra.c:5680 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6418)xpinstall/wizard/os2/setup/extra.c:5689 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6419)xpinstall/wizard/os2/setup/extra.c:5693 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6420)xpinstall/wizard/os2/setup/extra.c:5710 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6421)xpinstall/wizard/os2/setup/extra.c:5756 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6422)xpinstall/wizard/os2/setup/extra.c:5788 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6423)xpinstall/wizard/os2/setup/extra.c:5795 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6424)xpinstall/wizard/os2/setup/extra.c:5797 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6425)xpinstall/wizard/os2/setup/extra.c:5803 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6426)xpinstall/wizard/os2/setup/extra.c:5807 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6427)xpinstall/wizard/os2/setup/extra.c:5809 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6428)xpinstall/wizard/os2/setup/extra.c:5814 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6429)xpinstall/wizard/os2/setup/extra.c:5816 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6430)xpinstall/wizard/os2/setup/extra.c:5835 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6431)xpinstall/wizard/os2/setup/extra.c:5838 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6432)xpinstall/wizard/os2/setup/extra.c:5845 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6434)xpinstall/wizard/os2/setup/extra.c:5913 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6435)xpinstall/wizard/os2/setup/extra.c:5962 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6437)xpinstall/wizard/os2/setup/extra.c:5996 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6438)xpinstall/wizard/os2/setup/extra.c:6016 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6439)xpinstall/wizard/os2/setup/extra.c:6034 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6440)xpinstall/wizard/os2/setup/extra.c:6052 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6441)xpinstall/wizard/os2/setup/extra.c:6070 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6442)xpinstall/wizard/os2/setup/extra.c:6088 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6443)xpinstall/wizard/os2/setup/extra.c:6113 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6444)xpinstall/wizard/os2/setup/extra.c:6180 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6445)xpinstall/wizard/os2/setup/extra.c:6250 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6446)xpinstall/wizard/os2/setup/extra.c:6301 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6447)xpinstall/wizard/os2/setup/extra.c:6342 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6448)xpinstall/wizard/os2/setup/extra.c:6346 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6449)xpinstall/wizard/os2/setup/extra.c:6361 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6451)xpinstall/wizard/os2/setup/extra.c:6389 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6454)xpinstall/wizard/os2/setup/extra.c:417 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6455)xpinstall/wizard/os2/setup/extra.c:533 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6456)xpinstall/wizard/os2/setup/extra.c:537 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6457)xpinstall/wizard/os2/setup/extra.c:569 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6458)xpinstall/wizard/os2/setup/extra.c:576 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6459)xpinstall/wizard/os2/setup/extra.c:617 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6460)xpinstall/wizard/os2/setup/extra.c:624 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6461)xpinstall/wizard/os2/setup/extra.c:668 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6462)xpinstall/wizard/os2/setup/extra.c:700 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6463)xpinstall/wizard/os2/setup/extra.c:731 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6464)xpinstall/wizard/os2/setup/extra.c:751 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6465)xpinstall/wizard/os2/setup/extra.c:877 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6466)xpinstall/wizard/os2/setup/extra.c:1010 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6467)xpinstall/wizard/os2/setup/extra.c:1033 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6468)xpinstall/wizard/os2/setup/extra.c:1039 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6469)xpinstall/wizard/os2/setup/extra.c:1120 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6470)xpinstall/wizard/os2/setup/extra.c:1150 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6471)xpinstall/wizard/os2/setup/extra.c:1189 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6472)xpinstall/wizard/os2/setup/extra.c:1576 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6473)xpinstall/wizard/os2/setup/extra.c:1581 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6474)xpinstall/wizard/os2/setup/extra.c:1586 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6475)xpinstall/wizard/os2/setup/extra.c:1612 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6476)xpinstall/wizard/os2/setup/extra.c:1649 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6477)xpinstall/wizard/os2/setup/extra.c:1656 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6478)xpinstall/wizard/os2/setup/extra.c:1766 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6479)xpinstall/wizard/os2/setup/extra.c:2519 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6480)xpinstall/wizard/os2/setup/extra.c:3112 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6481)xpinstall/wizard/os2/setup/extra.c:3555 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6482)xpinstall/wizard/os2/setup/extra.c:3561 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6483)xpinstall/wizard/os2/setup/extra.c:3635 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6485)xpinstall/wizard/os2/setup/extra.c:3660 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6486)xpinstall/wizard/os2/setup/extra.c:3677 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6487)xpinstall/wizard/os2/setup/extra.c:3695 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6489)xpinstall/wizard/os2/setup/extra.c:3736 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6490)xpinstall/wizard/os2/setup/extra.c:3746 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6491)xpinstall/wizard/os2/setup/extra.c:3747 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6492)xpinstall/wizard/os2/setup/extra.c:3780 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6493)xpinstall/wizard/os2/setup/extra.c:3781 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6494)xpinstall/wizard/os2/setup/extra.c:3808 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6495)xpinstall/wizard/os2/setup/extra.c:3809 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6496)xpinstall/wizard/os2/setup/extra.c:3810 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6497)xpinstall/wizard/os2/setup/extra.c:3836 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6498)xpinstall/wizard/os2/setup/extra.c:3837 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6499)xpinstall/wizard/os2/setup/extra.c:3838 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6500)xpinstall/wizard/os2/setup/extra.c:3914 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6501)xpinstall/wizard/os2/setup/extra.c:3915 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6502)xpinstall/wizard/os2/setup/extra.c:3919 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6503)xpinstall/wizard/os2/setup/extra.c:3955 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6504)xpinstall/wizard/os2/setup/extra.c:3956 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6506)xpinstall/wizard/os2/setup/extra.c:3995 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6507)xpinstall/wizard/os2/setup/extra.c:3997 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6508)xpinstall/wizard/os2/setup/extra.c:4017 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6509)xpinstall/wizard/os2/setup/extra.c:4019 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6510)xpinstall/wizard/os2/setup/extra.c:4370 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6511)xpinstall/wizard/os2/setup/extra.c:4372 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6512)xpinstall/wizard/os2/setup/extra.c:4590 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6513)xpinstall/wizard/os2/setup/extra.c:4776 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6514)xpinstall/wizard/os2/setup/extra.c:4793 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6515)xpinstall/wizard/os2/setup/extra.c:4839 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6516)xpinstall/wizard/os2/setup/extra.c:4955 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6517)xpinstall/wizard/os2/setup/extra.c:4957 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6518)xpinstall/wizard/os2/setup/extra.c:4974 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6519)xpinstall/wizard/os2/setup/extra.c:4976 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6520)xpinstall/wizard/os2/setup/extra.c:5371 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6521)xpinstall/wizard/os2/setup/extra.c:5431 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6522)xpinstall/wizard/os2/setup/extra.c:5675 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6523)xpinstall/wizard/os2/setup/extra.c:5684 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6524)xpinstall/wizard/os2/setup/extra.c:5695 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6525)xpinstall/wizard/os2/setup/extra.c:5798 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6526)xpinstall/wizard/os2/setup/extra.c:5799 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6527)xpinstall/wizard/os2/setup/extra.c:5810 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6528)xpinstall/wizard/os2/setup/extra.c:5811 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6529)xpinstall/wizard/os2/setup/extra.c:5833 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6530)xpinstall/wizard/os2/setup/extra.c:5839 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6531)xpinstall/wizard/os2/setup/extra.c:5840 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6532)xpinstall/wizard/os2/setup/extra.c:5964 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6533)xpinstall/wizard/os2/setup/extra.c:5982 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6534)xpinstall/wizard/os2/setup/extra.c:5998 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6535)xpinstall/wizard/os2/setup/extra.c:6018 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6536)xpinstall/wizard/os2/setup/extra.c:6036 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6537)xpinstall/wizard/os2/setup/extra.c:6054 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6538)xpinstall/wizard/os2/setup/extra.c:6072 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6539)xpinstall/wizard/os2/setup/extra.c:6090 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6540)xpinstall/wizard/os2/setup/extra.c:6115 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6541)xpinstall/wizard/os2/setup/extra.c:6182 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6542)xpinstall/wizard/os2/setup/extra.c:6305 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6543)xpinstall/wizard/os2/setup/extra.c:6312 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6544)xpinstall/wizard/os2/setup/extra.c:6348 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6545)xpinstall/wizard/os2/setup/extra.c:6363 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6546)xpinstall/wizard/os2/setup/extra.c:6375 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6547)xpinstall/wizard/os2/setup/extra.c:6391 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6548)xpinstall/wizard/os2/setup/ifuncns.c:3403 Medium: srand: Standard random number generators should not be used to generate randomness used for security reasons. For security sensitive randomness a crytographic randomness generator that provides sufficient entropy should be used.
r6549)xpinstall/wizard/os2/setup/ifuncns.c:37 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6550)xpinstall/wizard/os2/setup/ifuncns.c:133 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6551)xpinstall/wizard/os2/setup/ifuncns.c:134 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6552)xpinstall/wizard/os2/setup/ifuncns.c:135 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6553)xpinstall/wizard/os2/setup/ifuncns.c:136 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6554)xpinstall/wizard/os2/setup/ifuncns.c:137 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6555)xpinstall/wizard/os2/setup/ifuncns.c:138 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6557)xpinstall/wizard/os2/setup/ifuncns.c:256 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6558)xpinstall/wizard/os2/setup/ifuncns.c:257 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6559)xpinstall/wizard/os2/setup/ifuncns.c:258 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6560)xpinstall/wizard/os2/setup/ifuncns.c:259 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6561)xpinstall/wizard/os2/setup/ifuncns.c:260 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6562)xpinstall/wizard/os2/setup/ifuncns.c:298 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6563)xpinstall/wizard/os2/setup/ifuncns.c:359 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6564)xpinstall/wizard/os2/setup/ifuncns.c:360 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6565)xpinstall/wizard/os2/setup/ifuncns.c:368 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6566)xpinstall/wizard/os2/setup/ifuncns.c:369 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6567)xpinstall/wizard/os2/setup/ifuncns.c:411 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6568)xpinstall/wizard/os2/setup/ifuncns.c:422 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6569)xpinstall/wizard/os2/setup/ifuncns.c:423 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6570)xpinstall/wizard/os2/setup/ifuncns.c:424 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6571)xpinstall/wizard/os2/setup/ifuncns.c:425 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6572)xpinstall/wizard/os2/setup/ifuncns.c:451 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6573)xpinstall/wizard/os2/setup/ifuncns.c:452 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6574)xpinstall/wizard/os2/setup/ifuncns.c:478 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6575)xpinstall/wizard/os2/setup/ifuncns.c:479 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6576)xpinstall/wizard/os2/setup/ifuncns.c:480 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6577)xpinstall/wizard/os2/setup/ifuncns.c:481 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6579)xpinstall/wizard/os2/setup/ifuncns.c:564 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6580)xpinstall/wizard/os2/setup/ifuncns.c:565 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6581)xpinstall/wizard/os2/setup/ifuncns.c:566 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6582)xpinstall/wizard/os2/setup/ifuncns.c:594 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6583)xpinstall/wizard/os2/setup/ifuncns.c:595 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6584)xpinstall/wizard/os2/setup/ifuncns.c:596 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6585)xpinstall/wizard/os2/setup/ifuncns.c:597 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6586)xpinstall/wizard/os2/setup/ifuncns.c:670 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6587)xpinstall/wizard/os2/setup/ifuncns.c:671 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6588)xpinstall/wizard/os2/setup/ifuncns.c:672 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6589)xpinstall/wizard/os2/setup/ifuncns.c:673 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6590)xpinstall/wizard/os2/setup/ifuncns.c:674 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6591)xpinstall/wizard/os2/setup/ifuncns.c:675 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6592)xpinstall/wizard/os2/setup/ifuncns.c:676 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6593)xpinstall/wizard/os2/setup/ifuncns.c:773 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6594)xpinstall/wizard/os2/setup/ifuncns.c:774 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6595)xpinstall/wizard/os2/setup/ifuncns.c:775 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6596)xpinstall/wizard/os2/setup/ifuncns.c:776 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6597)xpinstall/wizard/os2/setup/ifuncns.c:816 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6598)xpinstall/wizard/os2/setup/ifuncns.c:817 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6599)xpinstall/wizard/os2/setup/ifuncns.c:818 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6600)xpinstall/wizard/os2/setup/ifuncns.c:819 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6601)xpinstall/wizard/os2/setup/ifuncns.c:820 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6602)xpinstall/wizard/os2/setup/ifuncns.c:848 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6603)xpinstall/wizard/os2/setup/ifuncns.c:849 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6604)xpinstall/wizard/os2/setup/ifuncns.c:882 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6605)xpinstall/wizard/os2/setup/ifuncns.c:910 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6606)xpinstall/wizard/os2/setup/ifuncns.c:911 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6607)xpinstall/wizard/os2/setup/ifuncns.c:965 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6608)xpinstall/wizard/os2/setup/ifuncns.c:996 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6609)xpinstall/wizard/os2/setup/ifuncns.c:997 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6610)xpinstall/wizard/os2/setup/ifuncns.c:998 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6611)xpinstall/wizard/os2/setup/ifuncns.c:1025 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6612)xpinstall/wizard/os2/setup/ifuncns.c:1026 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6613)xpinstall/wizard/os2/setup/ifuncns.c:1074 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6615)xpinstall/wizard/os2/setup/ifuncns.c:1076 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6616)xpinstall/wizard/os2/setup/ifuncns.c:1102 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6617)xpinstall/wizard/os2/setup/ifuncns.c:1158 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6618)xpinstall/wizard/os2/setup/ifuncns.c:1159 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6619)xpinstall/wizard/os2/setup/ifuncns.c:1160 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6620)xpinstall/wizard/os2/setup/ifuncns.c:1189 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6621)xpinstall/wizard/os2/setup/ifuncns.c:1190 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6622)xpinstall/wizard/os2/setup/ifuncns.c:1191 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6623)xpinstall/wizard/os2/setup/ifuncns.c:1192 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6624)xpinstall/wizard/os2/setup/ifuncns.c:1193 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6625)xpinstall/wizard/os2/setup/ifuncns.c:1273 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6626)xpinstall/wizard/os2/setup/ifuncns.c:1274 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6627)xpinstall/wizard/os2/setup/ifuncns.c:1275 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6628)xpinstall/wizard/os2/setup/ifuncns.c:1276 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6629)xpinstall/wizard/os2/setup/ifuncns.c:1277 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6630)xpinstall/wizard/os2/setup/ifuncns.c:1278 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6631)xpinstall/wizard/os2/setup/ifuncns.c:1348 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6632)xpinstall/wizard/os2/setup/ifuncns.c:1349 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6633)xpinstall/wizard/os2/setup/ifuncns.c:1350 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6634)xpinstall/wizard/os2/setup/ifuncns.c:1351 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6635)xpinstall/wizard/os2/setup/ifuncns.c:1352 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6636)xpinstall/wizard/os2/setup/ifuncns.c:1353 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6637)xpinstall/wizard/os2/setup/ifuncns.c:1355 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6638)xpinstall/wizard/os2/setup/ifuncns.c:1356 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6639)xpinstall/wizard/os2/setup/ifuncns.c:1357 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6640)xpinstall/wizard/os2/setup/ifuncns.c:1358 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6641)xpinstall/wizard/os2/setup/ifuncns.c:1359 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6642)xpinstall/wizard/os2/setup/ifuncns.c:1360 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6643)xpinstall/wizard/os2/setup/ifuncns.c:1361 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6644)xpinstall/wizard/os2/setup/ifuncns.c:1487 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6645)xpinstall/wizard/os2/setup/ifuncns.c:1488 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6646)xpinstall/wizard/os2/setup/ifuncns.c:1489 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6647)xpinstall/wizard/os2/setup/ifuncns.c:1542 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6648)xpinstall/wizard/os2/setup/ifuncns.c:1543 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6649)xpinstall/wizard/os2/setup/ifuncns.c:1544 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6650)xpinstall/wizard/os2/setup/ifuncns.c:1545 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6651)xpinstall/wizard/os2/setup/ifuncns.c:1546 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6652)xpinstall/wizard/os2/setup/ifuncns.c:1547 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6653)xpinstall/wizard/os2/setup/ifuncns.c:1548 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6654)xpinstall/wizard/os2/setup/ifuncns.c:1588 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6655)xpinstall/wizard/os2/setup/ifuncns.c:1589 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6656)xpinstall/wizard/os2/setup/ifuncns.c:1590 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6657)xpinstall/wizard/os2/setup/ifuncns.c:125 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6658)xpinstall/wizard/os2/setup/ifuncns.c:144 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6659)xpinstall/wizard/os2/setup/ifuncns.c:277 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6660)xpinstall/wizard/os2/setup/ifuncns.c:318 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6661)xpinstall/wizard/os2/setup/ifuncns.c:385 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6662)xpinstall/wizard/os2/setup/ifuncns.c:389 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6663)xpinstall/wizard/os2/setup/ifuncns.c:503 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6665)xpinstall/wizard/os2/setup/ifuncns.c:537 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6666)xpinstall/wizard/os2/setup/ifuncns.c:604 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6667)xpinstall/wizard/os2/setup/ifuncns.c:635 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6668)xpinstall/wizard/os2/setup/ifuncns.c:640 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6669)xpinstall/wizard/os2/setup/ifuncns.c:686 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6671)xpinstall/wizard/os2/setup/ifuncns.c:702 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6672)xpinstall/wizard/os2/setup/ifuncns.c:703 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6673)xpinstall/wizard/os2/setup/ifuncns.c:708 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6674)xpinstall/wizard/os2/setup/ifuncns.c:709 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6676)xpinstall/wizard/os2/setup/ifuncns.c:736 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6677)xpinstall/wizard/os2/setup/ifuncns.c:752 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6678)xpinstall/wizard/os2/setup/ifuncns.c:853 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6679)xpinstall/wizard/os2/setup/ifuncns.c:858 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6680)xpinstall/wizard/os2/setup/ifuncns.c:886 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6681)xpinstall/wizard/os2/setup/ifuncns.c:891 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6682)xpinstall/wizard/os2/setup/ifuncns.c:915 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6683)xpinstall/wizard/os2/setup/ifuncns.c:1052 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6684)xpinstall/wizard/os2/setup/ifuncns.c:1110 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6685)xpinstall/wizard/os2/setup/ifuncns.c:1126 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6686)xpinstall/wizard/os2/setup/ifuncns.c:1296 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6687)xpinstall/wizard/os2/setup/ifuncns.c:1304 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6688)xpinstall/wizard/os2/setup/ifuncns.c:1312 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6689)xpinstall/wizard/os2/setup/ifuncns.c:1381 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6690)xpinstall/wizard/os2/setup/ifuncns.c:1459 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6691)xpinstall/wizard/os2/setup/ifuncns.c:1461 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6692)xpinstall/wizard/os2/setup/ifuncns.c:1469 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6693)xpinstall/wizard/os2/setup/ifuncns.c:148 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6694)xpinstall/wizard/os2/setup/ifuncns.c:281 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6695)xpinstall/wizard/os2/setup/ifuncns.c:506 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6696)xpinstall/wizard/os2/setup/ifuncns.c:534 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6697)xpinstall/wizard/os2/setup/ifuncns.c:539 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6698)xpinstall/wizard/os2/setup/ifuncns.c:606 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6699)xpinstall/wizard/os2/setup/ifuncns.c:637 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6700)xpinstall/wizard/os2/setup/ifuncns.c:642 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6701)xpinstall/wizard/os2/setup/ifuncns.c:688 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6703)xpinstall/wizard/os2/setup/ifuncns.c:754 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6704)xpinstall/wizard/os2/setup/ifuncns.c:756 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6705)xpinstall/wizard/os2/setup/ifuncns.c:761 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6706)xpinstall/wizard/os2/setup/ifuncns.c:860 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6707)xpinstall/wizard/os2/setup/ifuncns.c:865 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6708)xpinstall/wizard/os2/setup/ifuncns.c:893 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6709)xpinstall/wizard/os2/setup/ifuncns.c:898 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6710)xpinstall/wizard/os2/setup/ifuncns.c:919 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6711)xpinstall/wizard/os2/setup/ifuncns.c:924 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6713)xpinstall/wizard/os2/setup/ifuncns.c:1128 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6714)xpinstall/wizard/os2/setup/ifuncns.c:1242 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6715)xpinstall/wizard/os2/setup/ifuncns.c:1383 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6716)xpinstall/wizard/os2/setup/ifuncns.c:1399 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6717)xpinstall/wizard/os2/setup/ifuncns.c:1408 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6718)xpinstall/wizard/os2/setup/ifuncns.c:1417 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6719)xpinstall/wizard/os2/setup/ifuncns.c:1425 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6720)xpinstall/wizard/os2/setup/ifuncns.c:1434 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6721)xpinstall/wizard/os2/setup/ifuncns.c:1444 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6722)xpinstall/wizard/os2/setup/ifuncns.c:1453 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6723)xpinstall/wizard/os2/setup/ifuncns.c:1463 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6724)xpinstall/wizard/os2/setup/ifuncns.c:1471 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6725)xpinstall/wizard/os2/setup/ifuncns.c:376 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r6726)xpinstall/wizard/os2/setup/ifuncns.c:456 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r6727)xpinstall/wizard/os2/setup/ifuncns.c:1594 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r6728)xpinstall/wizard/os2/setup/logging.c:376 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6729)xpinstall/wizard/os2/setup/logging.c:456 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6730)xpinstall/wizard/os2/setup/logging.c:1594 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6731)xpinstall/wizard/os2/setup/logging.c:51 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6732)xpinstall/wizard/os2/setup/logging.c:523 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6733)xpinstall/wizard/os2/setup/setup.c:59 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6734)xpinstall/wizard/os2/setup/setup.c:76 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6735)xpinstall/wizard/os2/setup/setup.c:107 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6736)xpinstall/wizard/os2/setup/setup.c:118 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6737)xpinstall/wizard/os2/setup/setup.c:148 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6738)xpinstall/wizard/os2/setup/setup.c:189 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6739)xpinstall/wizard/os2/setup/setup.c:190 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6740)xpinstall/wizard/os2/setup/setup.c:246 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6741)xpinstall/wizard/os2/setup/setup.c:247 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6742)xpinstall/wizard/os2/setup/setup.c:266 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6743)xpinstall/wizard/os2/setup/setup.c:302 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6744)xpinstall/wizard/os2/setup/setup.c:330 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6745)xpinstall/wizard/os2/setup/setup.c:342 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6746)xpinstall/wizard/os2/setup/setup.c:350 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6747)xpinstall/wizard/os2/setup/setup.c:351 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6748)xpinstall/wizard/os2/setup/setup.c:360 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6749)xpinstall/wizard/os2/setup/setup.c:372 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6750)xpinstall/wizard/os2/setup/setup.c:380 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6751)xpinstall/wizard/os2/setup/setup.c:388 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6752)xpinstall/wizard/os2/setup/setup.c:402 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6753)xpinstall/wizard/os2/setup/setup.c:403 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6754)xpinstall/wizard/os2/setup/setup.c:404 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6755)xpinstall/wizard/os2/setup/setup.c:433 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6756)xpinstall/wizard/os2/setup/setup.c:445 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6757)xpinstall/wizard/os2/setup/setup.c:446 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6758)xpinstall/wizard/os2/setup/setup.c:472 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6759)xpinstall/wizard/os2/setup/setup.c:473 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6760)xpinstall/wizard/os2/setup/setup.c:492 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6761)xpinstall/wizard/os2/setup/setup.c:503 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6762)xpinstall/wizard/os2/setup/setup.c:514 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6763)xpinstall/wizard/os2/setup/setup.c:535 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6764)xpinstall/wizard/os2/setup/setup.c:558 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6765)xpinstall/wizard/os2/setup/setup.c:109 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6766)xpinstall/wizard/os2/setup/setup.c:137 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6768)xpinstall/wizard/os2/setup/setup.c:141 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r6769)xpinstall/wizard/os2/setup/setup.c:152 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r6770)xpinstall/wizard/os2/setup/xpi.c:141 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6771)xpinstall/wizard/os2/setup/xpi.c:152 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6772)xpinstall/wizard/os2/setup/xpi.c:63 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6773)xpinstall/wizard/os2/setup/xpi.c:64 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6774)xpinstall/wizard/os2/setup/xpi.c:65 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6775)xpinstall/wizard/os2/setup/xpi.c:157 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6776)xpinstall/wizard/os2/setup/xpi.c:187 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6777)xpinstall/wizard/os2/setup/xpi.c:188 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6778)xpinstall/wizard/os2/setup/xpi.c:189 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6779)xpinstall/wizard/os2/setup/xpi.c:190 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6780)xpinstall/wizard/os2/setup/xpi.c:191 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6781)xpinstall/wizard/os2/setup/xpi.c:253 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6782)xpinstall/wizard/os2/setup/xpi.c:285 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6783)xpinstall/wizard/os2/setup/xpi.c:340 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6784)xpinstall/wizard/os2/setup/xpi.c:75 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6785)xpinstall/wizard/os2/setup/xpi.c:87 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6786)xpinstall/wizard/os2/setup/xpi.c:171 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6787)xpinstall/wizard/os2/setup/xpi.c:208 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6788)xpinstall/wizard/os2/setup/xpi.c:238 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6789)xpinstall/wizard/os2/setup/xpi.c:243 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6790)xpinstall/wizard/os2/setup/xpi.c:248 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6797)xpinstall/wizard/os2/setup/xpi.c:97 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6798)xpinstall/wizard/os2/setup/xpi.c:103 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6799)xpinstall/wizard/os2/setup/xpi.c:109 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6800)xpinstall/wizard/os2/setup/xpi.c:115 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6801)xpinstall/wizard/os2/setup/xpi.c:257 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6802)xpinstall/wizard/os2/setup/xpi.c:271 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6803)xpinstall/wizard/os2/setup/setup.h:212 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6804)xpinstall/wizard/os2/setup/setup.h:240 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6805)xpinstall/wizard/os2/setup/setup.h:245 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6806)xpinstall/wizard/os2/setup/setup.h:250 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6807)xpinstall/wizard/os2/test/testxpi.c:454 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6808)xpinstall/wizard/os2/test/testxpi.c:455 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6809)xpinstall/wizard/os2/test/testxpi.c:456 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6810)xpinstall/wizard/os2/test/testxpi.c:457 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6811)xpinstall/wizard/os2/test/testxpi.c:458 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6812)xpinstall/wizard/os2/test/testxpi.c:459 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6813)xpinstall/wizard/os2/test/testxpi.c:460 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6814)xpinstall/wizard/os2/test/testxpi.c:461 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6815)xpinstall/wizard/os2/test/testxpi.c:462 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6816)xpinstall/wizard/os2/test/testxpi.c:463 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6817)xpinstall/wizard/os2/test/testxpi.c:464 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6818)xpinstall/wizard/os2/test/testxpi.c:465 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6819)xpinstall/wizard/os2/test/testxpi.c:466 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6820)xpinstall/wizard/os2/test/testxpi.c:467 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6821)xpinstall/wizard/os2/test/testxpi.c:468 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6822)xpinstall/wizard/os2/test/testxpi.c:469 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6823)xpinstall/wizard/os2/test/testxpi.c:470 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6824)xpinstall/wizard/os2/test/testxpi.c:471 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6825)xpinstall/wizard/os2/test/testxpi.c:472 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6826)xpinstall/wizard/os2/test/testxpi.c:473 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6827)xpinstall/wizard/os2/test/testxpi.c:474 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6828)xpinstall/wizard/os2/test/testxpi.c:475 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6829)xpinstall/wizard/os2/test/testxpi.c:476 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6830)xpinstall/wizard/os2/test/testxpi.c:477 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6831)xpinstall/wizard/os2/test/testxpi.c:478 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6832)xpinstall/wizard/os2/test/testxpi.c:479 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6833)xpinstall/wizard/os2/test/testxpi.c:480 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6834)xpinstall/wizard/os2/test/testxpi.c:481 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6835)xpinstall/wizard/os2/test/testxpi.c:482 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6836)xpinstall/wizard/os2/test/testxpi.c:483 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6837)xpinstall/wizard/os2/test/testxpi.c:484 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6838)xpinstall/wizard/os2/test/testxpi.c:485 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6839)xpinstall/wizard/os2/test/testxpi.c:486 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6840)xpinstall/wizard/os2/test/testxpi.c:487 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6841)xpinstall/wizard/os2/test/testxpi.c:488 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6842)xpinstall/wizard/os2/test/testxpi.c:489 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6843)xpinstall/wizard/os2/test/testxpi.c:490 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6844)xpinstall/wizard/os2/test/testxpi.c:491 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6845)xpinstall/wizard/os2/test/testxpi.c:492 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6846)xpinstall/wizard/os2/test/testxpi.c:493 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6847)xpinstall/wizard/os2/test/testxpi.c:494 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6848)xpinstall/wizard/os2/test/testxpi.c:495 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6849)xpinstall/wizard/os2/test/testxpi.c:496 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6850)xpinstall/wizard/os2/test/testxpi.c:497 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6851)xpinstall/wizard/os2/test/testxpi.c:498 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6852)xpinstall/wizard/os2/test/testxpi.c:505 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6853)xpinstall/wizard/os2/test/testxpi.c:506 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6854)xpinstall/wizard/os2/test/testxpi.c:522 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6855)xpinstall/wizard/os2/test/testxpi.c:49 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6856)xpinstall/wizard/os2/test/xpi.c:81 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6857)xpinstall/wizard/os2/test/xpi.c:149 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6858)xpinstall/wizard/os2/test/xpi.c:155 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6859)xpinstall/wizard/os2/test/xpi.c:164 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6860)xpinstall/wizard/os2/test/xpi.c:171 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6861)xpinstall/wizard/os2/uninstall/nsINIParser.cpp:42 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6862)xpinstall/wizard/os2/uninstall/nsINIParser.cpp:43 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6863)xpinstall/wizard/os2/uninstall/nsINIParser.cpp:105 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6864)xpinstall/wizard/os2/uninstall/nsINIParser.cpp:161 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6865)xpinstall/wizard/os2/uninstall/nsINIParser.cpp:41 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6866)xpinstall/wizard/os2/uninstall/nsINIParser.cpp:71 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6867)xpinstall/wizard/os2/uninstall/nsINIParser.cpp:263 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6868)xpinstall/wizard/os2/uninstall/nsINIParser.cpp:172 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6869)xpinstall/wizard/os2/uninstall/nsINIParser.cpp:247 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6870)xpinstall/wizard/os2/uninstall/nsINIParser.cpp:262 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6871)xpinstall/wizard/os2/uninstall/nsINIParser.cpp:249 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6872)xpinstall/wizard/os2/uninstall/nsINIParser.cpp:251 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6873)xpinstall/wizard/os2/uninstall/nsINIParser.cpp:265 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6874)xpinstall/wizard/os2/uninstall/nsINIParser.cpp:266 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6875)xpinstall/wizard/os2/uninstall/dialogs.c:252 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r6876)xpinstall/wizard/os2/uninstall/dialogs.c:34 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6877)xpinstall/wizard/os2/uninstall/dialogs.c:35 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6878)xpinstall/wizard/os2/uninstall/dialogs.c:78 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6879)xpinstall/wizard/os2/uninstall/dialogs.c:130 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6880)xpinstall/wizard/os2/uninstall/dialogs.c:270 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6881)xpinstall/wizard/os2/uninstall/dialogs.c:291 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6882)xpinstall/wizard/os2/uninstall/dialogs.c:299 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6883)xpinstall/wizard/os2/uninstall/dialogs.c:58 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6884)xpinstall/wizard/os2/uninstall/dialogs.c:60 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6885)xpinstall/wizard/os2/uninstall/dialogs.c:87 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r6886)xpinstall/wizard/os2/uninstall/dialogs.c:303 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r6887)xpinstall/wizard/os2/uninstall/extra.c:87 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6888)xpinstall/wizard/os2/uninstall/extra.c:303 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6889)xpinstall/wizard/os2/uninstall/extra.c:53 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6890)xpinstall/wizard/os2/uninstall/extra.c:101 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6891)xpinstall/wizard/os2/uninstall/extra.c:121 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6892)xpinstall/wizard/os2/uninstall/extra.c:138 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6893)xpinstall/wizard/os2/uninstall/extra.c:238 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6894)xpinstall/wizard/os2/uninstall/extra.c:258 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6895)xpinstall/wizard/os2/uninstall/extra.c:751 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6896)xpinstall/wizard/os2/uninstall/extra.c:752 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6897)xpinstall/wizard/os2/uninstall/extra.c:756 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6898)xpinstall/wizard/os2/uninstall/extra.c:802 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6899)xpinstall/wizard/os2/uninstall/extra.c:803 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6900)xpinstall/wizard/os2/uninstall/extra.c:804 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6901)xpinstall/wizard/os2/uninstall/extra.c:805 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6902)xpinstall/wizard/os2/uninstall/extra.c:806 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6903)xpinstall/wizard/os2/uninstall/extra.c:807 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6904)xpinstall/wizard/os2/uninstall/extra.c:808 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6905)xpinstall/wizard/os2/uninstall/extra.c:960 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6906)xpinstall/wizard/os2/uninstall/extra.c:961 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6907)xpinstall/wizard/os2/uninstall/extra.c:984 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6908)xpinstall/wizard/os2/uninstall/extra.c:985 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6909)xpinstall/wizard/os2/uninstall/extra.c:986 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6910)xpinstall/wizard/os2/uninstall/extra.c:987 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6911)xpinstall/wizard/os2/uninstall/extra.c:988 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6912)xpinstall/wizard/os2/uninstall/extra.c:989 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6913)xpinstall/wizard/os2/uninstall/extra.c:1029 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6914)xpinstall/wizard/os2/uninstall/extra.c:1030 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6915)xpinstall/wizard/os2/uninstall/extra.c:1031 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6916)xpinstall/wizard/os2/uninstall/extra.c:1032 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6917)xpinstall/wizard/os2/uninstall/extra.c:1033 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6918)xpinstall/wizard/os2/uninstall/extra.c:1034 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6919)xpinstall/wizard/os2/uninstall/extra.c:1035 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6920)xpinstall/wizard/os2/uninstall/extra.c:1116 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6921)xpinstall/wizard/os2/uninstall/extra.c:1117 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6922)xpinstall/wizard/os2/uninstall/extra.c:1118 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6923)xpinstall/wizard/os2/uninstall/extra.c:1119 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6924)xpinstall/wizard/os2/uninstall/extra.c:1196 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6925)xpinstall/wizard/os2/uninstall/extra.c:1225 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6926)xpinstall/wizard/os2/uninstall/extra.c:1226 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6927)xpinstall/wizard/os2/uninstall/extra.c:1227 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6928)xpinstall/wizard/os2/uninstall/extra.c:1228 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6929)xpinstall/wizard/os2/uninstall/extra.c:1229 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6930)xpinstall/wizard/os2/uninstall/extra.c:1321 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6935)xpinstall/wizard/os2/uninstall/extra.c:111 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6936)xpinstall/wizard/os2/uninstall/extra.c:128 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6937)xpinstall/wizard/os2/uninstall/extra.c:264 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6938)xpinstall/wizard/os2/uninstall/extra.c:1016 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r6939)xpinstall/wizard/os2/uninstall/extra.c:161 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6940)xpinstall/wizard/os2/uninstall/extra.c:189 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6941)xpinstall/wizard/os2/uninstall/extra.c:196 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6942)xpinstall/wizard/os2/uninstall/extra.c:204 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6943)xpinstall/wizard/os2/uninstall/extra.c:210 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6944)xpinstall/wizard/os2/uninstall/extra.c:245 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6945)xpinstall/wizard/os2/uninstall/extra.c:248 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6946)xpinstall/wizard/os2/uninstall/extra.c:291 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6947)xpinstall/wizard/os2/uninstall/extra.c:427 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6948)xpinstall/wizard/os2/uninstall/extra.c:433 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6949)xpinstall/wizard/os2/uninstall/extra.c:442 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6950)xpinstall/wizard/os2/uninstall/extra.c:449 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6951)xpinstall/wizard/os2/uninstall/extra.c:509 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6952)xpinstall/wizard/os2/uninstall/extra.c:654 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6953)xpinstall/wizard/os2/uninstall/extra.c:662 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6954)xpinstall/wizard/os2/uninstall/extra.c:670 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6955)xpinstall/wizard/os2/uninstall/extra.c:701 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6956)xpinstall/wizard/os2/uninstall/extra.c:734 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6957)xpinstall/wizard/os2/uninstall/extra.c:969 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6958)xpinstall/wizard/os2/uninstall/extra.c:976 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6959)xpinstall/wizard/os2/uninstall/extra.c:998 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6960)xpinstall/wizard/os2/uninstall/extra.c:1003 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6961)xpinstall/wizard/os2/uninstall/extra.c:1022 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6962)xpinstall/wizard/os2/uninstall/extra.c:1040 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6963)xpinstall/wizard/os2/uninstall/extra.c:1063 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6964)xpinstall/wizard/os2/uninstall/extra.c:1077 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6965)xpinstall/wizard/os2/uninstall/extra.c:1103 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6966)xpinstall/wizard/os2/uninstall/extra.c:1152 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6967)xpinstall/wizard/os2/uninstall/extra.c:1159 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6968)xpinstall/wizard/os2/uninstall/extra.c:1182 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6969)xpinstall/wizard/os2/uninstall/extra.c:1192 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6970)xpinstall/wizard/os2/uninstall/extra.c:1207 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6971)xpinstall/wizard/os2/uninstall/extra.c:1241 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6972)xpinstall/wizard/os2/uninstall/extra.c:1273 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6973)xpinstall/wizard/os2/uninstall/extra.c:1286 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6974)xpinstall/wizard/os2/uninstall/extra.c:1289 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6975)xpinstall/wizard/os2/uninstall/extra.c:1296 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6976)xpinstall/wizard/os2/uninstall/extra.c:1300 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6977)xpinstall/wizard/os2/uninstall/extra.c:1322 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6978)xpinstall/wizard/os2/uninstall/extra.c:191 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6979)xpinstall/wizard/os2/uninstall/extra.c:199 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6980)xpinstall/wizard/os2/uninstall/extra.c:250 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6981)xpinstall/wizard/os2/uninstall/extra.c:510 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6982)xpinstall/wizard/os2/uninstall/extra.c:828 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6983)xpinstall/wizard/os2/uninstall/extra.c:1013 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6984)xpinstall/wizard/os2/uninstall/extra.c:1105 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6985)xpinstall/wizard/os2/uninstall/extra.c:1284 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6986)xpinstall/wizard/os2/uninstall/extra.c:1290 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6987)xpinstall/wizard/os2/uninstall/extra.c:1291 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r6990)xpinstall/wizard/os2/uninstall/ifuncns.c:31 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6991)xpinstall/wizard/os2/uninstall/ifuncns.c:32 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6992)xpinstall/wizard/os2/uninstall/ifuncns.c:33 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6993)xpinstall/wizard/os2/uninstall/ifuncns.c:34 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6994)xpinstall/wizard/os2/uninstall/ifuncns.c:84 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6995)xpinstall/wizard/os2/uninstall/ifuncns.c:85 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6996)xpinstall/wizard/os2/uninstall/ifuncns.c:86 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6997)xpinstall/wizard/os2/uninstall/ifuncns.c:87 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6998)xpinstall/wizard/os2/uninstall/ifuncns.c:159 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r6999)xpinstall/wizard/os2/uninstall/ifuncns.c:160 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.