The following issues were found

drivers/media/dvb-frontends/sp2.h
1 issues
open - Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents?
Security

Line: 41 Column: 20 CWE codes: 362

              extern int sp2_ci_slot_shutdown(struct dvb_ca_en50221 *en50221, int slot);
extern int sp2_ci_slot_ts_enable(struct dvb_ca_en50221 *en50221, int slot);
extern int sp2_ci_poll_slot_status(struct dvb_ca_en50221 *en50221,
					int slot, int open);

#endif

            

Reported by FlawFinder.

drivers/net/ethernet/amd/au1000_eth.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 1181 Column: 4 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              		aup->phy1_search_mac0 = 1;
	} else {
		if (is_valid_ether_addr(pd->mac)) {
			memcpy(dev->dev_addr, pd->mac, ETH_ALEN);
		} else {
			/* Set a random MAC since no valid provided by platform_data. */
			eth_hw_addr_random(dev);
		}


            

Reported by FlawFinder.

drivers/media/dvb-frontends/si2165.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 1193 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              	}

	/* create dvb_frontend */
	memcpy(&state->fe.ops, &si2165_ops,
	       sizeof(struct dvb_frontend_ops));
	state->fe.ops.release = NULL;
	state->fe.demodulator_priv = state;
	i2c_set_clientdata(client, state);


            

Reported by FlawFinder.

drivers/net/ethernet/amd/mvme147.c
1 issues
sprintf - Does not check for buffer overflows
Security

Line: 90 Column: 3 CWE codes: 120
Suggestion: Use sprintf_s, snprintf, or vsnprintf

              		return ERR_PTR(-ENOMEM);

	if (unit >= 0)
		sprintf(dev->name, "eth%d", unit);

	/* Fill the dev fields */
	dev->base_addr = (unsigned long)MVME147_LANCE_BASE;
	dev->netdev_ops = &lance_netdev_ops;
	dev->dma = 0;

            

Reported by FlawFinder.

drivers/media/dvb-frontends/s921.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 492 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              	state->i2c = i2c;

	/* create dvb_frontend */
	memcpy(&state->frontend.ops, &s921_ops,
		sizeof(struct dvb_frontend_ops));
	state->frontend.demodulator_priv = state;

	return &state->frontend;
}

            

Reported by FlawFinder.

drivers/media/dvb-frontends/s5h1432.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 351 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              	state->inversion = state->config->inversion;

	/* create dvb_frontend */
	memcpy(&state->frontend.ops, &s5h1432_ops,
	       sizeof(struct dvb_frontend_ops));

	state->frontend.demodulator_priv = state;

	return &state->frontend;

            

Reported by FlawFinder.

drivers/media/dvb-frontends/s5h1411.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 880 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              		goto error;

	/* create dvb_frontend */
	memcpy(&state->frontend.ops, &s5h1411_ops,
	       sizeof(struct dvb_frontend_ops));

	state->frontend.demodulator_priv = state;

	if (s5h1411_init(&state->frontend) != 0) {

            

Reported by FlawFinder.

drivers/md/dm-switch.c
1 issues
char - Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues
Security

Line: 341 Column: 23 CWE codes: 119 120
Suggestion: Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length

               * PA-RISC	0.29s			0.31s
 * Opteron	0.0495s			0.0498s
 */
static const unsigned char hex_table[256] = {
255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 255, 255, 255, 255, 255, 255,
255, 10, 11, 12, 13, 14, 15, 255, 255, 255, 255, 255, 255, 255, 255, 255,

            

Reported by FlawFinder.

drivers/media/dvb-frontends/s5h1409.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 965 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              		goto error;

	/* create dvb_frontend */
	memcpy(&state->frontend.ops, &s5h1409_ops,
	       sizeof(struct dvb_frontend_ops));
	state->frontend.demodulator_priv = state;

	if (s5h1409_init(&state->frontend) != 0) {
		printk(KERN_ERR "%s: Failed to initialize correctly\n",

            

Reported by FlawFinder.

drivers/net/ethernet/davicom/dm9000.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 1673 Column: 3 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              
	if (!is_valid_ether_addr(ndev->dev_addr) && pdata != NULL) {
		mac_src = "platform data";
		memcpy(ndev->dev_addr, pdata->dev_addr, ETH_ALEN);
	}

	if (!is_valid_ether_addr(ndev->dev_addr)) {
		/* try reading from mac */


            

Reported by FlawFinder.