The following issues were found

src/third_party/wiredtiger/test/3rdparty/testtools-0.9.34/testtools/_compat2x.py
1 issues
invalid syntax (<unknown>, line 16)
Error

Line: 16 Column: 21

              
def reraise(exc_class, exc_obj, exc_tb, _marker=object()):
    """Re-raise an exception received from sys.exc_info() or similar."""
    raise exc_class, exc_obj, exc_tb


            

Reported by Pylint.

src/third_party/wiredtiger/test/3rdparty/testtools-0.9.34/testtools/__init__.py
1 issues
Statement seems to have no effect
Error

Line: 63 Column: 5

                      Matcher,
        )
# Shut up, pyflakes. We are importing for documentation, not for namespacing.
    Matcher

    from testtools.runtest import (
        MultipleExceptions,
        RunTest,
        )

            

Reported by Pylint.

src/third_party/unwind/dist/src/mi/mempool.c
1 issues
char - Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues
Security

Line: 42 Column: 8 CWE codes: 119 120
Suggestion: Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length

              # define MAX_ALIGN      MAX_ALIGN_(sizeof (long double))
#endif

static char sos_memory[SOS_MEMORY_SIZE] ALIGNED(MAX_ALIGN);
static size_t sos_memory_freepos;
static size_t pg_size;

HIDDEN void *
sos_alloc (size_t size)

            

Reported by FlawFinder.

src/third_party/unwind/dist/src/os-freebsd.c
1 issues
strncpy - Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned]
Security

Line: 138 Column: 10 CWE codes: 120

                   *mapoff = kv->kve_offset;
     if (path)
       {
         strncpy(path, kv->kve_path, pathlen);
       }
     ret = elf_map_image (ei, kv->kve_path);
     break;
  }
  free_mem(buf, len1);

            

Reported by FlawFinder.

src/third_party/unwind/dist/src/os-hpux.c
1 issues
strncpy - Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned]
Security

Line: 59 Column: 7 CWE codes: 120

                  return -UNW_ENOINFO;
  if (path)
    {
      strncpy(path, path2, pathlen);
      path[pathlen - 1] = '\0';
      if (strcmp(path, path2) != 0)
        Debug(1, "buffer size (%d) not big enough to hold path\n", pathlen);
    }
  Debug(1, "segbase=%lx, mapoff=%lx, path=%s\n", *segbase, *mapoff, path);

            

Reported by FlawFinder.

src/third_party/wiredtiger/test/3rdparty/python-subunit-0.0.16/setup.py
1 issues
Missing module docstring
Error

Line: 1 Column: 1

              #!/usr/bin/env python
try:
    # If the user has setuptools / distribute installed, use it
    from setuptools import setup
except ImportError:
    # Otherwise, fall back to distutils.
    from distutils.core import setup
    extra = {}
else:

            

Reported by Pylint.

src/third_party/unwind/dist/src/os-qnx.c
1 issues
strncpy - Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned]
Security

Line: 97 Column: 7 CWE codes: 120

                {
    if (path)
    {
      strncpy (path, cbi.path, pathlen);
    }

    *mapoff = cbi.offset;
    *segbase = cbi.segbase;


            

Reported by FlawFinder.

src/third_party/unwind/dist/src/ptrace/_UPT_get_dyn_info_list_addr.c
1 issues
char - Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues
Security

Line: 39 Column: 3 CWE codes: 119 120
Suggestion: Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length

                unsigned long lo, hi, off;
  struct UPT_info *ui = arg;
  struct map_iterator mi;
  char path[PATH_MAX];
  unw_word_t res;
  int count = 0;

  maps_init (&mi, ui->pid);
  while (maps_next (&mi, &lo, &hi, &off))

            

Reported by FlawFinder.

src/third_party/unwind/dist/src/sh/Gresume.c
1 issues
char - Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues
Security

Line: 55 Column: 9 CWE codes: 119 120
Suggestion: Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length

                    unsigned long pc = uc->uc_mcontext.pr;

      struct regs_overlay {
        char x[sizeof(regs)];
      };

      __asm__ __volatile__ (
        "mov.l @%0+, r8\n"
        "mov.l @%0+, r9\n"

            

Reported by FlawFinder.

src/third_party/unwind/dist/tests/test-proc-info.c
1 issues
fprintf - If format strings can be influenced by an attacker, they can be exploited
Security

Line: 44 Column: 14 CWE codes: 134
Suggestion: Use a constant for the format specification

              int errors;

#define panic(args...)					\
	{ ++errors; fprintf (stderr, args); return -1; }

static int
find_proc_info (unw_addr_space_t as UNUSED,
                unw_word_t ip UNUSED,
                unw_proc_info_t *pip UNUSED,

            

Reported by FlawFinder.