Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/h5VLStrHelperImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/h5fHelperImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/h5pHelperImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/exceptionImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/exceptionImp.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5Constants.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5Imp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5Imp.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5aImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5aImp.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5dImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5dImp.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5eImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5eImp.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5fImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5fImp.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5gImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5gImp.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5iImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5iImp.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5lImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5lImp.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5oImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5oImp.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5pImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5pImp.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5plImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5plImp.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5rImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5rImp.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5sImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5sImp.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5tImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5tImp.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5zImp.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5zImp.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/nativeData.c
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/nativeData.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5jni.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.h
Examining data/libsis-jhdf5-java-19.04.0+dfsg/source/c/h5lHelperImp.c

FINAL RESULTS:

data/libsis-jhdf5-java-19.04.0+dfsg/source/c/h5lHelperImp.c:204:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*(info->name+info->count), name);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/h5lHelperImp.c:291:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*(info->name+info->count), name);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5jni.h:37:30:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    #define HDstrcpy(X,Y)    strcpy(X,Y)
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5jni.h:49:30:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    #define HDstrcat(X,Y)    strcat(X,Y)
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5pImp.c:3882:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(member_name[i], utf8);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:318:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(fmt_llong, "%%%sd", H5_PRINTF_LL_WIDTH);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:319:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(fmt_ullong, "%%%su", H5_PRINTF_LL_WIDTH);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:420:17:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
                sscanf(token, fmt_ullong, &tmp_ullong);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:426:17:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
                sscanf(token, fmt_llong, &tmp_llong);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:609:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(fmt_llong, "%%%sd", H5_PRINTF_LL_WIDTH);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:610:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(fmt_ullong, "%%%su", H5_PRINTF_LL_WIDTH);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:705:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(fmt_llong, "%%%sd", H5_PRINTF_LL_WIDTH);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:706:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(fmt_ullong, "%%%su", H5_PRINTF_LL_WIDTH);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:824:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(this_str, fmt_ullong, tmp_ullong);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:830:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(this_str, fmt_llong, tmp_llong);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:867:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(this_str, "%s%02x", i ? ":" : "", ucptr[i]);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:997:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(this_str, "%s%02x", i ? ":" : "", ucptr[i]);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:1210:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(tmp_str, "%s%lu", j ? "," : "(",
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:1217:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(tmp_str, "%s%lu", j ? "," : ")-(",
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:1393:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(tmp_str, "%s%lu", j ? "," : "(",
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:3003:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(*(datainfo->objname+datainfo->count), name);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/exceptionImp.c:227:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *args[2];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/exceptionImp.c:339:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       *args[2];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5jni.h:28:32:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    #define HDmemcpy(X,Y,Z)    memcpy((char*)(X),(const char*)(Y),Z)
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5jni.h:55:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    #define HDfopen(S,M)    fopen(S,M)
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5pImp.c:3838:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        *member_name[H5FD_MEM_NTYPES];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:178:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char     fmt_llong[8], fmt_ullong[8];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:296:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char     fmt_llong[8], fmt_ullong[8];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:461:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char enum_name[1024];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:591:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char     fmt_llong[8], fmt_ullong[8];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:685:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char     fmt_llong[8], fmt_ullong[8];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:718:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(this_str, "%g", tmp_float);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:724:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(this_str, "%g", tmp_double);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:731:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(this_str, "%Lf", tmp_ldouble);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:768:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(this_str, "%u", tmp_uchar);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:774:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(this_str, "%hhd", tmp_char);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:782:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(this_str, "%u", tmp_uint);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:788:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(this_str, "%d", tmp_int);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:796:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(this_str, "%u", tmp_ushort);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:802:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(this_str, "%d", tmp_short);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:810:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(this_str, "%lu", tmp_ulong);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:816:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(this_str, "%ld", tmp_long);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:853:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char enum_name[1024];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:863:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(this_str, "%#02x", ucptr[0]);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:883:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char         ref_name[1024];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:938:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(this_str, "%u-%lu", (unsigned) oi.type, oi.addr);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:993:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(this_str, "%#02x", ucptr[0]);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:1181:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       tmp_str[256];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:1363:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       tmp_str[256];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/nativeData.c:644:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char bytes[4];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/nativeData.c:714:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char bytes[4];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/nativeData.c:783:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char bytes[4];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/nativeData.c:852:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char bytes[8];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/nativeData.c:922:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char bytes[8];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/nativeData.c:987:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char bytes[sizeof(int)];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/nativeData.c:1026:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char bytes[sizeof(float)];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/nativeData.c:1065:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char bytes[sizeof(short)];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/nativeData.c:1105:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char bytes[sizeof(double)];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/nativeData.c:1145:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char bytes[sizeof(jlong)];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/nativeData.c:1184:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char bytes[sizeof(jbyte)];
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/h5lHelperImp.c:198:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *(info->name+info->count) = (char *) malloc(strlen(name)+1);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/h5lHelperImp.c:285:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *(info->name+info->count) = (char *) malloc(strlen(name)+1);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5dImp.c:1078:25:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                        strncpy(&c_buf[i * str_len], utf8, str_len);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5jni.h:40:31:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    #define HDstrncpy(X,Y,Z)  strncpy(X,Y,Z)
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5jni.h:46:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    #define HDstrlen(S)    strlen(S)
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5pImp.c:3880:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    member_name[i] = (char*)HDmalloc(strlen(utf8) + 1);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5pImp.c:4188:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(cacheinfo.trace_file_name, str, 1025);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:1772:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                size = strlen(s);
data/libsis-jhdf5-java-19.04.0+dfsg/source/c/jni/h5util.c:2956:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        *(datainfo->objname+datainfo->count) = (char *)HDmalloc(strlen(name)+1);

ANALYSIS SUMMARY:

Hits = 69
Lines analyzed = 28666 in approximately 0.79 seconds (36058 lines/second)
Physical Source Lines of Code (SLOC) = 18986
Hits@level = [0]  14 [1]   9 [2]  39 [3]   0 [4]  21 [5]   0
Hits@level+ = [0+]  83 [1+]  69 [2+]  60 [3+]  21 [4+]  21 [5+]   0
Hits/KSLOC@level+ = [0+] 4.37164 [1+] 3.63426 [2+] 3.16022 [3+] 1.10608 [4+] 1.10608 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.