The following issues were found

drivers/net/ethernet/ezchip/nps_enet.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 59 Column: 3 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              		u32 buf;

		ioread32_rep(priv->regs_base + NPS_ENET_REG_RX_BUF, &buf, 1);
		memcpy((u8 *)reg, &buf, last);
	}
}

static u32 nps_enet_rx_handler(struct net_device *ndev)
{

            

Reported by FlawFinder.

drivers/net/fjes/fjes_hw.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 950 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              					     info->v1i.frame_max]);

	ring_frame->frame_size = size;
	memcpy((void *)(ring_frame->frame_data), (void *)frame, size);

	EP_RING_INDEX_INC(epbh->info->v1i.tail, info->v1i.count_max);

	return 0;
}

            

Reported by FlawFinder.

drivers/net/fddi/skfp/h/targetos.h
1 issues
char - Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues
Security

Line: 125 Column: 11 CWE codes: 119 120
Suggestion: Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length

              	struct pci_dev 	pdev;		/* PCI device structure */
	
	unsigned long base_addr;
	unsigned char factory_mac_addr[8];
	ulong	SharedMemSize;
	ulong	SharedMemHeap;
	void*	SharedMemAddr;
	dma_addr_t SharedMemDMA;


            

Reported by FlawFinder.

drivers/net/ppp/pptp.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 485 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              	sp.sa_protocol  = PX_PROTO_PPTP;
	sp.sa_addr.pptp = pppox_sk(sock->sk)->proto.pptp.src_addr;

	memcpy(uaddr, &sp, len);

	return len;
}

static int pptp_release(struct socket *sock)

            

Reported by FlawFinder.

drivers/net/wireless/broadcom/brcm80211/brcmsmac/pub.h
1 issues
char - Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues
Security

Line: 171 Column: 2 CWE codes: 119 120
Suggestion: Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length

              
	u16 boardrev;	/* version # of particular board */
	u8 sromrev;		/* version # of the srom */
	char srom_ccode[BRCM_CNTRY_BUF_SZ];	/* Country Code in SROM */
	u32 boardflags;	/* Board specific flags from srom */
	u32 boardflags2;	/* More board flags if sromrev >= 4 */
	bool phy_11ncapable;	/* the PHY/HW is capable of 802.11N */

	struct wl_cnt *_cnt;	/* low-level counters in driver */

            

Reported by FlawFinder.

drivers/net/fddi/skfp/h/smc.h
1 issues
char - Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues
Security

Line: 94 Column: 2 CWE codes: 119 120
Suggestion: Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length

              	 * this variable must have enough bits to hold all entiies in
	 * the station. So NUMPHYS may not be greater than 31.
	 */
	char	ec_pad[2] ;
	struct smt_timer ecm_timer ;	/* timer */
} ;


/*

            

Reported by FlawFinder.

drivers/net/fddi/skfp/h/osdef1st.h
1 issues
printf - If format strings can be influenced by an attacker, they can be exploited
Security

Line: 52 Column: 9 CWE codes: 134
Suggestion: Use a constant for the format specification

              

#ifdef DEBUG
#define printf(s,args...) printk(KERN_INFO s, ## args)
#endif

// #define HW_PTR	u_long
// -----------------------


            

Reported by FlawFinder.

drivers/net/fddi/skfp/h/mbuf.h
1 issues
char - Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues
Security

Line: 37 Column: 2 CWE codes: 119 120
Suggestion: Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length

              #ifdef	PCI
	int		sm_use_count ;
#endif
	char		sm_data[M_SIZE] ;
} ;

typedef struct s_mbuf SMbuf ;

/* mbuf head, to typed data */

            

Reported by FlawFinder.

drivers/net/fddi/skfp/h/cmtdef.h
1 issues
printf - If format strings can be influenced by an attacker, they can be exploited
Security

Line: 54 Column: 17 CWE codes: 134
Suggestion: Use a constant for the format specification

              
#ifdef	DEBUG
#define	DB_PR(flag, fmt, ...)						\
	do { if (flag) printf(fmt "\n", ##__VA_ARGS__); } while (0)
#else
#define	DB_PR(flag, fmt, ...)	no_printk(fmt "\n", ##__VA_ARGS__)

#endif


            

Reported by FlawFinder.

drivers/net/ethernet/mellanox/mlx5/core/ipoib/ipoib.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 135 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              		}
	}

	memcpy(&priv->stats.sw, &s, sizeof(s));
}

void mlx5i_get_stats(struct net_device *dev, struct rtnl_link_stats64 *stats)
{
	struct mlx5e_priv     *priv   = mlx5i_epriv(dev);

            

Reported by FlawFinder.