lab4code - scan-build results

User:qsesdcc_gmail_com@clang
Working Directory:/home/qsesdcc_gmail_com/lab4code
Command Line:make clean all
Clang Version:clang version 9.0.0 (https://github.com/llvm/llvm-project.git fe6dbadc0d53efdc34c096dd1695f23467ea6591)
Date:Thu Nov 7 11:01:28 2019

Bug Summary

Bug TypeQuantityDisplay?
All Bugs6
Memory error
Memory leak1
Security
Potential buffer overflow in call to 'gets'3
Potential insecure memory buffer bounds restriction in call 'strcpy'2

Reports

Bug Group Bug Type ▾ File Function/Method Line Path Length Description
Memory errorMemory leakexample2.cmain204Potential leak of memory pointed to by 'name'View Report
SecurityPotential buffer overflow in call to 'gets'example1.cmain171Call to function 'gets' is extremely insecure as it can always result in a buffer overflowView Report
SecurityPotential buffer overflow in call to 'gets'example3.cmain141Call to function 'gets' is extremely insecure as it can always result in a buffer overflowView Report
SecurityPotential buffer overflow in call to 'gets'example2.cmain161Call to function 'gets' is extremely insecure as it can always result in a buffer overflowView Report
SecurityPotential insecure memory buffer bounds restriction in call 'strcpy'example2.cmain141Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119View Report
SecurityPotential insecure memory buffer bounds restriction in call 'strcpy'example1.cmain131Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119View Report