Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/libvideo-capture-v4l-perl-0.902/RTjpeg/codec/RTjpeg.h
Examining data/libvideo-capture-v4l-perl-0.902/RTjpeg/codec/modules/RTb2s.c
Examining data/libvideo-capture-v4l-perl-0.902/RTjpeg/codec/modules/RTs2b.c
Examining data/libvideo-capture-v4l-perl-0.902/RTjpeg/codec/modules/RTcolor_grey.c
Examining data/libvideo-capture-v4l-perl-0.902/RTjpeg/codec/modules/RTmain.c
Examining data/libvideo-capture-v4l-perl-0.902/RTjpeg/codec/modules/RTdct_aan.c
Examining data/libvideo-capture-v4l-perl-0.902/RTjpeg/codec/modules/RTdct_std.c
Examining data/libvideo-capture-v4l-perl-0.902/RTjpeg/codec/modules/RTcolor_int.c
Examining data/libvideo-capture-v4l-perl-0.902/RTjpeg/codec/modules/RTidct_aan.c
Examining data/libvideo-capture-v4l-perl-0.902/RTjpeg/codec/modules/RTidct_std.c
Examining data/libvideo-capture-v4l-perl-0.902/RTjpeg/codec/modules/RTquant.c
Examining data/libvideo-capture-v4l-perl-0.902/RTjpeg/codec/modules/RTs2b_raw.c
Examining data/libvideo-capture-v4l-perl-0.902/RTjpeg/codec/modules/RTquant_mmx.c
Examining data/libvideo-capture-v4l-perl-0.902/RTjpeg/codec/modules/RTb2s_raw.c
Examining data/libvideo-capture-v4l-perl-0.902/gppport.h

FINAL RESULTS:

data/libvideo-capture-v4l-perl-0.902/RTjpeg/codec/modules/RTcolor_int.c:316:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 bcopy(buf, rgb, RTjpeg_width*RTjpeg_height);

ANALYSIS SUMMARY:

Hits = 1
Lines analyzed = 2036 in approximately 0.11 seconds (19258 lines/second)
Physical Source Lines of Code (SLOC) = 1495
Hits@level = [0]   1 [1]   0 [2]   1 [3]   0 [4]   0 [5]   0
Hits@level+ = [0+]   2 [1+]   1 [2+]   1 [3+]   0 [4+]   0 [5+]   0
Hits/KSLOC@level+ = [0+] 1.33779 [1+] 0.668896 [2+] 0.668896 [3+]   0 [4+]   0 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.