The following issues were found

src/third_party/boost/libs/unordered/ci/download-boost-snapshot.py
1 issues
Missing parentheses in call to 'print'. Did you mean print("Downloading: " + download_url)? (<unknown>, line 31)
Error

Line: 31 Column: 20

                  filename = ''
    for download_url in downloads:
        try:
            print "Downloading: " + download_url
            (filename, headers) = urllib.urlretrieve(download_url)

            print "Extracting: " + filename
            dir = tempfile.mkdtemp()
            extract(filename, dir)

            

Reported by Pylint.

src/third_party/fmt/dist/include/fmt/os.h
1 issues
read - Check buffer boundaries if used in a loop including recursive loops
Security

Line: 319 Column: 18 CWE codes: 120 20

                FMT_API long long size() const;

  // Attempts to read count bytes from the file into the specified buffer.
  FMT_API size_t read(void* buffer, size_t count);

  // Attempts to write count bytes from the specified buffer to the file.
  FMT_API size_t write(const void* buffer, size_t count);

  // Duplicates a file descriptor with the dup function and returns

            

Reported by FlawFinder.

src/third_party/boost/boost/random/traits.hpp
1 issues
random - This function is not sufficiently random for security-related functions such as key and nonce creation
Security

Line: 29 Column: 11 CWE codes: 327
Suggestion: Use a more secure technique for acquiring random values

              #include <limits>

namespace boost {
namespace random {
namespace traits {
   // \cond show_private
   template <class T, bool intrinsic>
   struct make_unsigned_imp
   {

            

Reported by FlawFinder.

src/third_party/gperftools/dist/benchmark/run_benchmark.c
1 issues
strlen - Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected)
Security

Line: 102 Column: 23 CWE codes: 126

                  int padding_size;

    slen = printf("Benchmark: %s", name);
    if (param && name[strlen(name)-1] != ')') {
      slen += printf("(%lld)", (long long)param);
    }
    padding_size = 60 - slen;
    if (padding_size < 1) {
      padding_size = 1;

            

Reported by FlawFinder.

src/third_party/gperftools/dist/src/base/basictypes.h
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 247 Column: 3 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              template <class Dest, class Source>
inline void bit_store(Dest *dest, const Source *source) {
  COMPILE_ASSERT(sizeof(Dest) == sizeof(Source), bitcasting_unequal_sizes);
  memcpy(dest, source, sizeof(Dest));
}

#ifdef HAVE___ATTRIBUTE__
# define ATTRIBUTE_WEAK      __attribute__((weak))
# define ATTRIBUTE_NOINLINE  __attribute__((noinline))

            

Reported by FlawFinder.

src/third_party/boost/boost/random/subtract_with_carry.hpp
1 issues
random - This function is not sufficiently random for security-related functions such as key and nonce creation
Security

Line: 39 Column: 11 CWE codes: 327
Suggestion: Use a more secure technique for acquiring random values

              

namespace boost {
namespace random {

namespace detail {
   
struct subtract_with_carry_discard
{

            

Reported by FlawFinder.

src/third_party/boost/boost/random/student_t_distribution.hpp
1 issues
random - This function is not sufficiently random for security-related functions such as key and nonce creation
Security

Line: 25 Column: 11 CWE codes: 327
Suggestion: Use a more secure technique for acquiring random values

              #include <boost/random/normal_distribution.hpp>

namespace boost {
namespace random {

/**
 * The Student t distribution is a real valued distribution with one
 * parameter n, the number of degrees of freedom.
 *

            

Reported by FlawFinder.

src/third_party/gperftools/dist/src/base/logging.cc
1 issues
open - Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents?
Security

Line: 91 Column: 10 CWE codes: 362

              #define NO_INTR(fn)  do {} while ((fn) < 0 && errno == EINTR)

RawFD RawOpenForWriting(const char* filename) {
  return open(filename, O_WRONLY|O_CREAT|O_TRUNC, 0664);
}

void RawWrite(RawFD fd, const char* buf, size_t len) {
  while (len > 0) {
    ssize_t r;

            

Reported by FlawFinder.

src/third_party/boost/boost/random/sobol.hpp
1 issues
random - This function is not sufficiently random for security-related functions such as key and nonce creation
Security

Line: 17 Column: 11 CWE codes: 327
Suggestion: Use a more secure technique for acquiring random values

              #include <boost/assert.hpp>

namespace boost {
namespace random {

/** @cond */
namespace qrng_detail {

// sobol_lattice sets up the random-number generator to produce a Sobol

            

Reported by FlawFinder.

src/third_party/boost/boost/random/shuffle_output.hpp
1 issues
random - This function is not sufficiently random for security-related functions such as key and nonce creation
Security

Line: 22 Column: 11 CWE codes: 327
Suggestion: Use a more secure technique for acquiring random values

              #include <boost/random/shuffle_order.hpp>

namespace boost {
namespace random {

/// \cond

template<typename URNG, int k, 
         typename URNG::result_type val = 0> 

            

Reported by FlawFinder.