The following issues were found

src/third_party/boost/boost/serialization/extended_type_info_typeid.hpp
1 issues
access - This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition
Security

Line: 135 Column: 31 CWE codes: 362/367!
Suggestion: Set up the correct permissions (e.g., using setuid()) and try to open the file directly

                      }
    }
    void destroy(void const * const p) const BOOST_OVERRIDE {
        boost::serialization::access::destroy(
            static_cast<T const *>(p)
        );
        //delete static_cast<T const * const>(p);
    }
};

            

Reported by FlawFinder.

src/third_party/boost/boost/smart_ptr/detail/quick_allocator.hpp
1 issues
char - Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues
Security

Line: 40 Column: 5 CWE codes: 119 120
Suggestion: Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length

              {
    typedef typename boost::type_with_alignment<align_>::type aligner_type;
    aligner_type aligner;
    char bytes[size];
    freeblock * next;
};

template<unsigned size, unsigned align_> struct allocator_impl
{

            

Reported by FlawFinder.

src/third_party/boost/boost/smart_ptr/detail/sp_counted_base_vacpp_ppc.hpp
1 issues
char - Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues
Security

Line: 93 Column: 5 CWE codes: 119 120
Suggestion: Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length

              
    int use_count_;        // #shared
    int weak_count_;       // #weak + (#shared != 0)
    char pad[64] __attribute__((__aligned__(64)));
            // pad to prevent false sharing
public:

    sp_counted_base(): use_count_( 1 ), weak_count_( 1 )
    {

            

Reported by FlawFinder.

src/third_party/boost/boost/smart_ptr/make_shared_object.hpp
1 issues
char - Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues
Security

Line: 35 Column: 9 CWE codes: 119 120
Suggestion: Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length

              {
    union type
    {
        char data_[ N ];
        typename boost::type_with_alignment< A >::type align_;
    };
};

template< class T > class sp_ms_deleter

            

Reported by FlawFinder.

src/third_party/boost/boost/smart_ptr/shared_ptr.hpp
1 issues
char - Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues
Security

Line: 264 Column: 13 CWE codes: 119 120
Suggestion: Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length

              #if !defined( BOOST_SP_NO_SP_CONVERTIBLE )

    // static_assert( sp_convertible< Y, T >::value );
    typedef char tmp[ sp_convertible< Y, T >::value? 1: -1 ];
    (void)sizeof( tmp );

#else

    T* p = static_cast< Y* >( 0 );

            

Reported by FlawFinder.

src/third_party/boost/boost/system/detail/enable_if.hpp
1 issues
system - This causes a new program to execute and is difficult to use safely
Security

Line: 11 Column: 11 CWE codes: 78
Suggestion: try using a library call that implements the same functionality if available

              namespace boost
{

namespace system
{

namespace detail
{


            

Reported by FlawFinder.

src/third_party/boost/boost/locale/message.hpp
1 issues
strlen - Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected)
Security

Line: 157 Column: 36 CWE codes: 126

                              {
                    if(is_us_ascii_string(msg))
                        return msg;
                    buffer.reserve(strlen(msg));
                    char c;
                    while((c=*msg++)!=0) {
                        if(is_us_ascii_char(c))
                            buffer+=c;
                    }

            

Reported by FlawFinder.

src/third_party/boost/boost/system/detail/error_category.hpp
1 issues
system - This causes a new program to execute and is difficult to use safely
Security

Line: 27 Column: 11 CWE codes: 78
Suggestion: try using a library call that implements the same functionality if available

              namespace boost
{

namespace system
{

class error_category;
class error_code;
class error_condition;

            

Reported by FlawFinder.

src/third_party/boost/boost/system/detail/error_code.hpp
1 issues
system - This causes a new program to execute and is difficult to use safely
Security

Line: 26 Column: 11 CWE codes: 78
Suggestion: try using a library call that implements the same functionality if available

              namespace boost
{

namespace system
{

//  class error_code

//  We want error_code to be a value type that can be copied without slicing

            

Reported by FlawFinder.

src/third_party/boost/boost/system/detail/error_condition.hpp
1 issues
system - This causes a new program to execute and is difficult to use safely
Security

Line: 23 Column: 11 CWE codes: 78
Suggestion: try using a library call that implements the same functionality if available

              namespace boost
{

namespace system
{

// class error_condition

// error_conditions are portable, error_codes are system or library specific

            

Reported by FlawFinder.