id stringclasses 908
values | source stringlengths 16 114k | label stringclasses 15
values |
|---|---|---|
CVE-2018-17205 | ofproto_aa_mapping_register(struct ofproto *ofproto, void *aux,
const struct aa_mapping_settings *s)
{
if (!ofproto->ofproto_class->aa_mapping_set) {
return EOPNOTSUPP;
}
ofproto->ofproto_class->aa_mapping_set(ofproto, aux, s);
return 0;
}
| Non-vul |
CVE-2016-5844 | toi(const void *p, int n)
{
const unsigned char *v = (const unsigned char *)p;
if (n > 1)
return v[0] + 256 * toi(v + 1, n - 1);
if (n == 1)
return v[0];
return (0);
}
| Non-vul |
CVE-2017-7865 | int attribute_align_arg avcodec_decode_video2(AVCodecContext *avctx, AVFrame *picture,
int *got_picture_ptr,
const AVPacket *avpkt)
{
AVCodecInternal *avci = avctx->internal;
int ret;
AVPacket tmp = *avpkt;
if (... | Non-vul |
CVE-2016-10749 | static cJSON *cJSON_New_Item(void)
{
cJSON* node = (cJSON*)cJSON_malloc(sizeof(cJSON));
if (node) memset(node,0,sizeof(cJSON));
return node;
}
| Non-vul |
CVE-2019-5760 | webrtc::RTCErrorType RTCPeerConnectionHandler::SetConfiguration(
const webrtc::PeerConnectionInterface::RTCConfiguration& blink_config) {
DCHECK(task_runner_->RunsTasksInCurrentSequence());
TRACE_EVENT0("webrtc", "RTCPeerConnectionHandler::setConfiguration");
webrtc::PeerConnectionInterface::RTCConfiguration... | Non-vul |
CVE-2017-12900 | lldp_private_8021_print(netdissect_options *ndo,
const u_char *tptr, u_int tlv_len)
{
int subtype, hexdump = FALSE;
u_int sublen;
u_int tval;
uint8_t i;
if (tlv_len < 4) {
return hexdump;
}
subtype = *(tptr+3);
ND_PRINT((ndo, "\n\t %s Subtype (%u)",
... | Non-vul |
CVE-2018-19198 | void testEscaping() {
const bool SPACE_TO_PLUS = true;
const bool SPACE_TO_PERCENT = false;
const bool KEEP_UNMODIFIED = false;
const bool NORMALIZE = true;
TEST_ASSERT(testEscapingHelper(L"abc def", L"abc+def", SPACE_TO_PLUS));
TEST_ASSERT(testEscapingHelper(L"abc def", L"abc%20def", SPACE_TO_PERCENT));
... | Non-vul |
CVE-2019-5809 | void RenderFrameHostImpl::CreatePortal(blink::mojom::PortalRequest request,
CreatePortalCallback callback) {
if (frame_tree_node()->parent()) {
mojo::ReportBadMessage(
"RFHI::CreatePortal called in a nested browsing context");
return;
}
Portal* portal = Porta... | Non-vul |
CVE-2018-17205 | OVS_EXCLUDED(ofproto_mutex)
{
struct ofproto *ofproto = ofconn_get_ofproto(ofconn);
struct ofputil_flow_stats_request request;
struct ofputil_aggregate_stats stats;
bool unknown_packets, unknown_bytes;
struct rule_criteria criteria;
struct rule_collection rules;
struct ofpbuf *reply;
... | Non-vul |
CVE-2017-12190 | static void bio_copy_kern_endio(struct bio *bio)
{
bio_free_pages(bio);
bio_put(bio);
}
| Non-vul |
CVE-2018-11380 | void MACH0_(mach_headerfields)(RBinFile *file) {
RBuffer *buf = file->buf;
int n = 0;
struct MACH0_(mach_header) *mh = MACH0_(get_hdr_from_bytes)(buf);
if (!mh) {
return;
}
printf ("0x00000000 Magic 0x%x\n", mh->magic);
printf ("0x00000004 CpuType 0x%x\n", mh->cputype);
printf ("0x00000008 CpuSub... | Non-vul |
CVE-2018-12460 | static void dct_unquantize_mpeg2_intra_bitexact(MpegEncContext *s,
int16_t *block, int n, int qscale)
{
int i, level, nCoeffs;
const uint16_t *quant_matrix;
int sum=-1;
if (s->q_scale_type) qscale = ff_mpeg2_non_linear_qscale[qscale];
else qscale <... | Non-vul |
CVE-2017-18238 | static void MacRomanToUTF8 ( const std::string & macRoman, std::string * utf8 )
{
utf8->erase();
for ( XMP_Uns8* chPtr = (XMP_Uns8*)macRoman.c_str(); *chPtr != 0; ++chPtr ) { // ! Don't trust that char is unsigned.
if ( *chPtr < 0x80 ) {
(*utf8) += (char)*chPtr;
} else {
(*utf8) += kMacRomanUTF8[(*chPtr)-... | Non-vul |
CVE-2016-5209 | ImageBitmap::ImageBitmap(HTMLCanvasElement* canvas,
Optional<IntRect> cropRect,
const ImageBitmapOptions& options) {
ASSERT(canvas->isPaintable());
RefPtr<Image> input = canvas->copiedImage(BackBuffer, PreferAcceleration);
ParsedOptions parsedOptions =
parse... | Non-vul |
CVE-2017-9949 | static int _server_handle_qSupported(libgdbr_t *g) {
int ret;
char *buf;
if (!(buf = malloc (128))) {
return -1;
}
snprintf (buf, 127, "PacketSize=%x", (ut32) (g->read_max - 1));
if ((ret = handle_qSupported (g)) < 0) {
return -1;
}
ret = send_msg (g, buf);
free (buf);
return ret;
}
| Non-vul |
CVE-2014-5045 | static int may_open(struct path *path, int acc_mode, int flag)
{
struct dentry *dentry = path->dentry;
struct inode *inode = dentry->d_inode;
int error;
/* O_PATH? */
if (!acc_mode)
return 0;
if (!inode)
return -ENOENT;
switch (inode->i_mode & S_IFMT) {
case S_IFLNK:
return -ELOOP;
case S_IFDIR:
if ... | Non-vul |
CVE-2016-5219 | bool GLES2Implementation::GetIntegeri_vHelper(GLenum pname,
GLuint index,
GLint* data) {
return false;
}
| Non-vul |
CVE-2017-9949 | grub_ext2_read_block (grub_fshelp_node_t node, grub_disk_addr_t fileblock)
{
struct grub_ext2_data *data = node->data;
struct grub_ext2_inode *inode = &node->inode;
int blknr = -1;
unsigned int blksz = EXT2_BLOCK_SIZE (data);
int log2_blksz = LOG2_EXT2_BLOCK_SIZE (data);
if (grub_le_to_cpu32(inode->flags) ... | CWE-787 |
CVE-2018-16427 | static int cac_parse_ACA_service(sc_card_t *card, cac_private_data_t *priv,
u8 *val, size_t val_len)
{
size_t len = 0;
u8 *val_end = val + val_len;
int r;
SC_FUNC_CALLED(card->ctx, SC_LOG_DEBUG_VERBOSE);
for (; val < val_end; val += len) {
/* get the tag and the length */
u8 tag;
if (sc_simpletlv_read_... | Non-vul |
CVE-2017-18120 | read_compressed_image(Gif_Image *gfi, Gif_Reader *grr, int read_flags)
{
if (grr->is_record) {
const uint32_t image_pos = grr->pos;
/* scan over image */
++grr->pos; /* skip min code size */
while (grr->pos < grr->length) {
int amt = grr->v[grr->pos];
grr->pos += amt + 1;
if (... | Non-vul |
CVE-2018-16640 | Magick_Orientation_to_Exif_Orientation(const OrientationType orientation)
{
switch (orientation)
{
/* Convert to Exif orientations as defined in "Exchangeable image file
* format for digital still cameras: Exif Version 2.31",
* http://www.cipa.jp/std/documents/e/DC-008-Translation-2016-E.pdf
*/
... | Non-vul |
CVE-2019-3817 | COMPS_HSList* comps_objrtree_values(COMPS_ObjRTree * rt) {
return __comps_objrtree_all(rt, 1);
}
| Non-vul |
CVE-2016-9262 | int jas_stream_gobble(jas_stream_t *stream, int n)
{
int m;
m = n;
for (m = n; m > 0; --m) {
if (jas_stream_getc(stream) == EOF) {
return n - m;
}
}
return n;
}
| CWE-190 |
CVE-2016-5191 | gfx::ImageSkia GetFolderIcon(gfx::VectorIconId id, SkColor text_color) {
return gfx::CreateVectorIcon(id,
color_utils::DeriveDefaultIconColor(text_color));
}
| Non-vul |
CVE-2018-16425 | static int select_app_df(void)
{
sc_path_t path;
sc_file_t *file;
char str[80];
int r;
strcpy(str, "3F00");
if (opt_appdf != NULL)
strlcat(str, opt_appdf, sizeof str);
sc_format_path(str, &path);
r = sc_select_file(card, &path, &file);
if (r) {
fprintf(stderr, "Unable to select application DF: %s\n", sc_s... | Non-vul |
CVE-2016-5147 | PaintLayerScrollableArea::ConvertFromContainingEmbeddedContentViewToScrollbar(
const Scrollbar& scrollbar,
const IntPoint& parent_point) const {
LayoutView* view = GetLayoutBox()->View();
if (!view)
return parent_point;
IntPoint point = view->GetFrameView()->ConvertToLayoutObject(*GetLayoutBox(),
... | Non-vul |
CVE-2018-12247 | mrb_obj_ivar_get(mrb_state *mrb, mrb_value self)
{
mrb_sym iv_name;
mrb_get_args(mrb, "n", &iv_name);
mrb_iv_check(mrb, iv_name);
return mrb_iv_get(mrb, self, iv_name);
}
| Non-vul |
CVE-2018-12714 | static int s_show(struct seq_file *m, void *v)
{
struct trace_iterator *iter = v;
int ret;
if (iter->ent == NULL) {
if (iter->tr) {
seq_printf(m, "# tracer: %s\n", iter->trace->name);
seq_puts(m, "#\n");
test_ftrace_alive(m);
}
if (iter->snapshot && trace_empty(iter))
print_snapshot_help(m, iter);... | Non-vul |
CVE-2017-6952 | void * CAPSTONE_API cs_winkernel_calloc(size_t n, size_t size)
{
size_t total = n * size;
void *new_ptr = cs_winkernel_malloc(total);
if (!new_ptr) {
return NULL;
}
return RtlFillMemory(new_ptr, total, 0);
}
| Non-vul |
CVE-2012-5110 | int HTMLSelectElement::activeSelectionStartListIndex() const
{
if (m_activeSelectionAnchorIndex >= 0)
return m_activeSelectionAnchorIndex;
return optionToListIndex(selectedIndex());
}
| Non-vul |
CVE-2018-13006 | GF_Err srpp_Write(GF_Box *s, GF_BitStream *bs)
{
GF_Err e;
GF_SRTPProcessBox *ptr = (GF_SRTPProcessBox *)s;
if (ptr == NULL) return GF_BAD_PARAM;
e = gf_isom_full_box_write(s, bs);
if (e) return e;
gf_bs_write_u32(bs, ptr->encryption_algorithm_rtp);
gf_bs_write_u32(bs, ptr->encryption_algorithm_rtcp);
gf_bs_wr... | Non-vul |
CVE-2011-4930 | pseudo_set_job_attr( const char *name, const char *expr, bool log )
{
RemoteResource *remote;
if (parallelMasterResource == NULL) {
remote = thisRemoteResource;
} else {
remote = parallelMasterResource;
}
if(Shadow->updateJobAttr(name,expr,log)) {
dprintf(D_SYSCALLS,"pseudo_set_job_attr(%s,%s) succeeded\n",n... | Non-vul |
CVE-2017-6386 | static void vrend_free_programs(struct vrend_sub_context *sub)
{
struct vrend_linked_shader_program *ent, *tmp;
if (LIST_IS_EMPTY(&sub->programs))
return;
LIST_FOR_EACH_ENTRY_SAFE(ent, tmp, &sub->programs, head) {
vrend_destroy_program(ent);
}
}
| Non-vul |
CVE-2016-6295 | PHP_FUNCTION(snmp_set_quick_print)
{
long a1;
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "l", &a1) == FAILURE) {
RETURN_FALSE;
}
netsnmp_ds_set_boolean(NETSNMP_DS_LIBRARY_ID, NETSNMP_DS_LIB_QUICK_PRINT, (int)a1);
RETURN_TRUE;
}
| Non-vul |
CVE-2018-16541 | gs_pop_integer(gs_main_instance * minst, long *result)
{
i_ctx_t *i_ctx_p = minst->i_ctx_p;
ref vref;
int code = pop_value(i_ctx_p, &vref);
if (code < 0)
return code;
check_type_only(vref, t_integer);
*result = vref.value.intval;
ref_stack_pop(&o_stack, 1);
return 0;
}
| Non-vul |
CVE-2018-12896 | SYSCALL_DEFINE2(timer_gettime, timer_t, timer_id,
struct __kernel_itimerspec __user *, setting)
{
struct itimerspec64 cur_setting;
int ret = do_timer_gettime(timer_id, &cur_setting);
if (!ret) {
if (put_itimerspec64(&cur_setting, setting))
ret = -EFAULT;
}
return ret;
}
| Non-vul |
CVE-2016-5170 | void Document::exitPointerLock() {
if (!GetPage())
return;
if (Element* target = GetPage()->GetPointerLockController().GetElement()) {
if (target->GetDocument() != this)
return;
GetPage()->GetPointerLockController().RequestPointerUnlock();
}
}
| Non-vul |
CVE-2018-6198 | newTab(void)
{
TabBuffer *n;
n = New(TabBuffer);
if (n == NULL)
return NULL;
n->nextTab = NULL;
n->currentBuffer = NULL;
n->firstBuffer = NULL;
return n;
}
| Non-vul |
CVE-2017-15116 | static int crypto_rng_report(struct sk_buff *skb, struct crypto_alg *alg)
{
struct crypto_report_rng rrng;
strncpy(rrng.type, "rng", sizeof(rrng.type));
rrng.seedsize = seedsize(alg);
if (nla_put(skb, CRYPTOCFGA_REPORT_RNG,
sizeof(struct crypto_report_rng), &rrng))
goto nla_put_failure;
return 0;
nla_p... | Non-vul |
CVE-2011-4930 | FileTransfer::SimpleInit(ClassAd *Ad, bool want_check_perms, bool is_server,
ReliSock *sock_to_use, priv_state priv,
bool use_file_catalog, bool is_spool)
{
char buf[ATTRLIST_MAX_EXPRESSION];
char *dynamic_buf = NULL;
jobAd = *Ad; // save job ad
if( did_init ) {
return 1;
}
user_supplied_key ... | Non-vul |
CVE-2017-8929 | int yr_object_create(
int8_t type,
const char* identifier,
YR_OBJECT* parent,
YR_OBJECT** object)
{
YR_OBJECT* obj;
int i;
size_t object_size = 0;
assert(parent != NULL || object != NULL);
switch (type)
{
case OBJECT_TYPE_STRUCTURE:
object_size = sizeof(YR_OBJECT_STRUCTURE);
... | Non-vul |
CVE-2017-17052 | static int free_vm_stack_cache(unsigned int cpu)
{
struct vm_struct **cached_vm_stacks = per_cpu_ptr(cached_stacks, cpu);
int i;
for (i = 0; i < NR_CACHED_STACKS; i++) {
struct vm_struct *vm_stack = cached_vm_stacks[i];
if (!vm_stack)
continue;
vfree(vm_stack->addr);
cached_vm_stacks[i] = NULL;
}
re... | Non-vul |
CVE-2018-19198 | bool testNormalizeSyntaxHelper(const wchar_t * uriText, const wchar_t * expectedNormalized,
unsigned int mask = static_cast<unsigned int>(-1)) {
UriParserStateW stateW;
int res;
UriUriW testUri;
stateW.uri = &testUri;
res = uriParseUriW(&stateW, uriText);
if (res != 0) {
uriFreeUriMembersW(&testUri)... | Non-vul |
CVE-2017-5019 | void RenderFrameImpl::HandleRendererDebugURL(const GURL& url) {
DCHECK(IsRendererDebugURL(url));
base::WeakPtr<RenderFrameImpl> weak_this = weak_factory_.GetWeakPtr();
if (url.SchemeIs(url::kJavaScriptScheme)) {
frame_->LoadJavaScriptURL(url);
} else {
HandleChromeDebugURL(url);
}
if (weak_this && ... | Non-vul |
CVE-2017-15427 | bool OmniboxViewViews::IsCommandIdEnabled(int command_id) const {
if (command_id == IDS_APP_PASTE)
return !read_only() && !GetClipboardText().empty();
if (command_id == IDS_PASTE_AND_GO)
return !read_only() && model()->CanPasteAndGo(GetClipboardText());
return Textfield::IsCommandIdEnabled(command_id) ||
... | Non-vul |
CVE-2019-3817 | COMPS_ObjRTree * comps_objrtree_clone(COMPS_ObjRTree *rt) {
COMPS_HSList *to_clone, *tmplist, *new_subnodes;
COMPS_ObjRTree *ret;
COMPS_HSListItem *it, *it2;
COMPS_ObjRTreeData *rtdata;
COMPS_Object *new_data;
if (!rt) return NULL;
to_clone = comps_hslist_create();
comps_hslist_init(t... | Non-vul |
CVE-2018-7757 | static int smp_execute_task(struct domain_device *dev, void *req, int req_size,
void *resp, int resp_size)
{
struct scatterlist req_sg;
struct scatterlist resp_sg;
sg_init_one(&req_sg, req, req_size);
sg_init_one(&resp_sg, resp, resp_size);
return smp_execute_task_sg(dev, &req_sg, &resp_sg);
}
| Non-vul |
CVE-2017-5019 | void ServiceWorkerContextCore::AddProviderHost(
std::unique_ptr<ServiceWorkerProviderHost> host) {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
int provider_id = host->provider_id();
providers_->emplace(provider_id, std::move(host));
}
| Non-vul |
CVE-2016-5219 | void GLES2DecoderImpl::DoSamplerParameteri(
GLuint client_id, GLenum pname, GLint param) {
Sampler* sampler = GetSampler(client_id);
if (!sampler) {
LOCAL_SET_GL_ERROR(
GL_INVALID_VALUE, "glSamplerParameteri", "unknown sampler");
return;
}
sampler_manager()->SetParameteri("glSamplerParameter... | Non-vul |
CVE-2016-5170 | void Document::DidChangeVisibilityState() {
DispatchEvent(*Event::CreateBubble(event_type_names::kVisibilitychange));
DispatchEvent(
*Event::CreateBubble(event_type_names::kWebkitvisibilitychange));
if (IsPageVisible())
Timeline().SetAllCompositorPending();
if (hidden() && canvas_font_cache_)
ca... | Non-vul |
CVE-2016-5096 | PHP_FUNCTION(file_get_contents)
{
char *filename;
int filename_len;
char *contents;
zend_bool use_include_path = 0;
php_stream *stream;
long len;
long offset = -1;
long maxlen = PHP_STREAM_COPY_ALL;
zval *zcontext = NULL;
php_stream_context *context = NULL;
/* Parse arguments */
if (zend_parse_parameters(Z... | Non-vul |
CVE-2013-4118 | static void security_premaster_hash(const char* input, int length, const BYTE* premaster_secret, const BYTE* client_random, const BYTE* server_random, BYTE* output)
{
/* PremasterHash(Input) = SaltedHash(PremasterSecret, Input, ClientRandom, ServerRandom) */
security_salted_hash(premaster_secret, (BYTE*)input, length... | Non-vul |
CVE-2017-18241 | void update_meta_page(struct f2fs_sb_info *sbi, void *src, block_t blk_addr)
{
struct page *page = grab_meta_page(sbi, blk_addr);
void *dst = page_address(page);
if (src)
memcpy(dst, src, PAGE_SIZE);
else
memset(dst, 0, PAGE_SIZE);
set_page_dirty(page);
f2fs_put_page(page, 1);
}
| Non-vul |
CVE-2018-8098 | static int read_entry(
git_index_entry **out,
size_t *out_size,
git_index *index,
const void *buffer,
size_t buffer_size,
const char *last)
{
size_t path_length, entry_size;
const char *path_ptr;
struct entry_short source;
git_index_entry entry = {{0}};
bool compressed = index->version >= INDEX_VERSION_NUMBE... | CWE-190 |
CVE-2016-7910 | static ssize_t disk_events_poll_msecs_store(struct device *dev,
struct device_attribute *attr,
const char *buf, size_t count)
{
struct gendisk *disk = dev_to_disk(dev);
long intv;
if (!count || !sscanf(buf, "%ld", &intv))
return -EINVAL;
if (intv < 0 && intv != -1)
return -EINVAL;
disk_blo... | Non-vul |
CVE-2015-8963 | static int perf_event_set_bpf_prog(struct perf_event *event, u32 prog_fd)
{
struct bpf_prog *prog;
if (event->attr.type != PERF_TYPE_TRACEPOINT)
return -EINVAL;
if (event->tp_event->prog)
return -EEXIST;
if (!(event->tp_event->flags & TRACE_EVENT_FL_UKPROBE))
/* bpf programs can only be attached to u/kprob... | Non-vul |
CVE-2015-1196 | cwd_is_root (char const *name)
{
unsigned int prefix_len = FILE_SYSTEM_PREFIX_LEN (name);
char root[prefix_len + 2];
struct stat st;
dev_t root_dev;
ino_t root_ino;
memcpy (root, name, prefix_len);
root[prefix_len] = '/';
root[prefix_len + 1] = 0;
if (stat (root, &st))
return false;
root_dev = ... | Non-vul |
CVE-2017-14058 | static int hls_read_packet(AVFormatContext *s, AVPacket *pkt)
{
HLSContext *c = s->priv_data;
int ret, i, minplaylist = -1;
recheck_discard_flags(s, c->first_packet);
c->first_packet = 0;
for (i = 0; i < c->n_playlists; i++) {
struct playlist *pls = c->playlists[i];
/* Make sure we... | Non-vul |
CVE-2018-6063 | MojoVideoEncodeAccelerator::MojoVideoEncodeAccelerator(
mojom::VideoEncodeAcceleratorPtr vea,
const gpu::VideoEncodeAcceleratorSupportedProfiles& supported_profiles)
: vea_(std::move(vea)), supported_profiles_(supported_profiles) {
DVLOG(1) << __func__;
DCHECK(vea_);
}
| Non-vul |
CVE-2016-5094 | static inline void find_entity_for_char_basic(
unsigned int k,
const entity_stage3_row *table,
const unsigned char **entity,
size_t *entity_len)
{
if (k >= 64U) {
*entity = NULL;
*entity_len = 0;
return;
}
*entity = table[k].data.ent.entity;
*entity_len = table[k].data.ent.entity_len;
}
| Non-vul |
CVE-2018-13094 | xfs_attr3_leaf_moveents(
struct xfs_da_args *args,
struct xfs_attr_leafblock *leaf_s,
struct xfs_attr3_icleaf_hdr *ichdr_s,
int start_s,
struct xfs_attr_leafblock *leaf_d,
struct xfs_attr3_icleaf_hdr *ichdr_d,
int start_d,
int count)
{
struct xfs_attr_leaf_entry *entry_s;
struct xfs_attr_leaf_entry ... | Non-vul |
CVE-2017-14041 | static void convert_6u32s_C1R(const OPJ_BYTE* pSrc, OPJ_INT32* pDst,
OPJ_SIZE_T length)
{
OPJ_SIZE_T i;
for (i = 0; i < (length & ~(OPJ_SIZE_T)3U); i += 4U) {
OPJ_UINT32 val0 = *pSrc++;
OPJ_UINT32 val1 = *pSrc++;
OPJ_UINT32 val2 = *pSrc++;
pDst[i + 0... | Non-vul |
CVE-2016-5219 | ScopedFramebufferCopyBinder::ScopedFramebufferCopyBinder(
GLES2DecoderImpl* decoder,
GLint x,
GLint y,
GLint width,
GLint height)
: decoder_(decoder) {
const Framebuffer::Attachment* attachment =
decoder->framebuffer_state_.bound_read_framebuffer.get()
->GetReadBufferAttachment... | Non-vul |
CVE-2017-2647 | void big_key_describe(const struct key *key, struct seq_file *m)
{
unsigned long datalen = key->type_data.x[1];
seq_puts(m, key->description);
if (key_is_instantiated(key))
seq_printf(m, ": %lu [%s]",
datalen,
datalen > BIG_KEY_FILE_THRESHOLD ? "file" : "buff");
}
| Non-vul |
CVE-2017-17439 | make_etype_info2_entry(ETYPE_INFO2_ENTRY *ent, Key *key)
{
krb5_error_code ret;
ent->etype = key->key.keytype;
if(key->salt) {
ALLOC(ent->salt);
if (ent->salt == NULL)
return ENOMEM;
*ent->salt = malloc(key->salt->salt.length + 1);
if (*ent->salt == NULL) {
free(ent->salt);
ent->salt = N... | Non-vul |
CVE-2018-16427 | static int setcos_pin_index_44(int *pins, int len, int pin)
{
int i;
for (i = 0; i < len; i++) {
if (pins[i] == pin)
return i;
if (pins[i] == -1) {
pins[i] = pin;
return i;
}
}
assert(i != len); /* Too much PINs, shouldn't happen */
return 0;
}
| Non-vul |
CVE-2017-7866 | static void png_handle_row(PNGDecContext *s)
{
uint8_t *ptr, *last_row;
int got_line;
if (!s->interlace_type) {
ptr = s->image_buf + s->image_linesize * (s->y + s->y_offset) + s->x_offset * s->bpp;
if (s->y == 0)
last_row = s->last_row;
else
last_row = ptr - ... | Non-vul |
CVE-2016-5170 | bool Document::IsSlotAssignmentOrLegacyDistributionDirty() const {
if (ChildNeedsDistributionRecalc())
return true;
if (slot_assignment_engine_ &&
slot_assignment_engine_->HasPendingSlotAssignmentRecalc()) {
return true;
}
return false;
}
| Non-vul |
CVE-2019-5778 | std::unique_ptr<base::Value> StringVectorToValue(
const std::vector<std::string>& strings) {
ListBuilder builder;
for (const auto& str : strings)
builder.Append(str);
return builder.Build();
}
| Non-vul |
CVE-2016-5769 | PHP_FUNCTION(mcrypt_cfb)
{
zval **mode;
char *cipher, *key, *data, *iv = NULL;
int cipher_len, key_len, data_len, iv_len = 0;
MCRYPT_GET_CRYPT_ARGS
convert_to_long_ex(mode);
php_mcrypt_do_crypt(cipher, key, key_len, data, data_len, "cfb", iv, iv_len, ZEND_NUM_ARGS(), Z_LVAL_PP(mode), return_value TSRMLS_C... | CWE-190 |
CVE-2017-15306 | bool kvm_arch_intc_initialized(struct kvm *kvm)
{
#ifdef CONFIG_KVM_MPIC
if (kvm->arch.mpic)
return true;
#endif
#ifdef CONFIG_KVM_XICS
if (kvm->arch.xics || kvm->arch.xive)
return true;
#endif
return false;
}
| Non-vul |
CVE-2017-1000211 | static void CacheThru_free(HTStream *me)
{
CacheThru_do_free(me);
(*me->actions->_free) (me->target);
FREE(me);
}
| Non-vul |
CVE-2019-9003 | static struct bmc_device *ipmi_find_bmc_prod_dev_id(
struct device_driver *drv,
unsigned int product_id, unsigned char device_id)
{
struct prod_dev_id id = {
.product_id = product_id,
.device_id = device_id,
};
struct device *dev;
struct bmc_device *bmc = NULL;
dev = driver_find_device(drv, NULL, &id, __fin... | Non-vul |
CVE-2016-5170 | void Document::ScheduleLayoutTreeUpdate() {
DCHECK(!HasPendingVisualUpdate());
DCHECK(ShouldScheduleLayoutTreeUpdate());
DCHECK(NeedsLayoutTreeUpdate());
if (!View()->CanThrottleRendering())
GetPage()->Animator().ScheduleVisualUpdate(GetFrame());
lifecycle_.EnsureStateAtMost(DocumentLifecycle::kVisualUpd... | Non-vul |
CVE-2016-7532 | static size_t PSDPackbitsEncodeImage(Image *image,const size_t length,
const unsigned char *pixels,unsigned char *compact_pixels,
ExceptionInfo *exception)
{
int
count;
register ssize_t
i,
j;
register unsigned char
*q;
unsigned char
*packbits;
/*
Compress pixels with Packbits e... | Non-vul |
CVE-2018-1999015 | static int mpeg4_decode_sprite_trajectory(Mpeg4DecContext *ctx, GetBitContext *gb)
{
MpegEncContext *s = &ctx->m;
int a = 2 << s->sprite_warping_accuracy;
int rho = 3 - s->sprite_warping_accuracy;
int r = 16 / a;
int alpha = 1;
int beta = 0;
int w = s->width;
int h = ... | Non-vul |
CVE-2016-10250 | void jp2_box_dump(jp2_box_t *box, FILE *out)
{
jp2_boxinfo_t *boxinfo;
boxinfo = jp2_boxinfolookup(box->type);
assert(boxinfo);
fprintf(out, "JP2 box: ");
fprintf(out, "type=%c%s%c (0x%08"PRIxFAST32"); length=%"PRIuFAST32"\n", '"', boxinfo->name,
'"', box->type, box->len);
if (box->ops->dumpdata) {
(*b... | CWE-476 |
CVE-2018-16427 | static int card_reset(const char *reset_type)
{
int cold_reset;
int r;
if (reset_type && strcmp(reset_type, "cold") &&
strcmp(reset_type, "warm")) {
fprintf(stderr, "Invalid reset type: %s\n", reset_type);
return 2;
}
cold_reset = !reset_type || strcmp(reset_type, "cold") == 0;
r = sc_lock(card);
if ... | Non-vul |
CVE-2018-10888 | static int lookup_index_alloc(
void **out, unsigned long *out_len, size_t entries, size_t hash_count)
{
size_t entries_len, hash_len, index_len;
GITERR_CHECK_ALLOC_MULTIPLY(&entries_len, entries, sizeof(struct index_entry));
GITERR_CHECK_ALLOC_MULTIPLY(&hash_len, hash_count, sizeof(struct index_entry *));
GITERR... | Non-vul |
CVE-2017-12989 | resp_print_integer(netdissect_options *ndo, register const u_char *bp, int length) {
return resp_print_string_error_integer(ndo, bp, length);
}
| Non-vul |
CVE-2017-12168 | void kvm_register_target_sys_reg_table(unsigned int target,
struct kvm_sys_reg_target_table *table)
{
target_tables[target] = table;
}
| Non-vul |
CVE-2018-20847 | void opj_pi_update_encode_poc_and_final ( opj_cp_t *p_cp,
OPJ_UINT32 p_tileno,
OPJ_INT32 p_tx0,
OPJ_INT32 p_tx1,
OPJ_INT32 p_ty0,
... | Non-vul |
CVE-2019-5809 | ScopedInterfaceParamsReplacer(
WebContents* web_contents,
mojom::DidCommitProvisionalLoadInterfaceParamsPtr params_override)
: DidCommitNavigationInterceptor(web_contents),
params_override_(std::move(params_override)) {}
| Non-vul |
CVE-2019-11487 | static int fuse_copy_do(struct fuse_copy_state *cs, void **val, unsigned *size)
{
unsigned ncpy = min(*size, cs->len);
if (val) {
void *pgaddr = kmap_atomic(cs->pg);
void *buf = pgaddr + cs->offset;
if (cs->write)
memcpy(buf, *val, ncpy);
else
memcpy(*val, buf, ncpy);
kunmap_atomic(pgaddr);
*val +... | Non-vul |
CVE-2017-5019 | void ServiceWorkerContextCore::RemoveProviderHost(int provider_id) {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
providers_->erase(provider_id);
}
| Non-vul |
CVE-2016-2347 | static void process_level0_extended_area(LHAFileHeader *header,
uint8_t *data, size_t data_len)
{
if (!strncmp(header->compress_method, "-pm", 3)) {
return;
}
switch (data[0]) {
case LHA_OS_TYPE_UNIX:
case LHA_OS_TYPE_OS9_68K:
process_level0_unix_area(header, data... | Non-vul |
CVE-2019-13106 | int eeprom_write_enable(unsigned dev_addr, int state)
{
kw_gpio_set_value(KM_KIRKWOOD_ENV_WP, !state);
return !kw_gpio_get_value(KM_KIRKWOOD_ENV_WP);
}
| Non-vul |
CVE-2018-20856 | static void blk_queue_usage_counter_release(struct percpu_ref *ref)
{
struct request_queue *q =
container_of(ref, struct request_queue, q_usage_counter);
wake_up_all(&q->mq_freeze_wq);
}
| Non-vul |
CVE-2017-9798 | AP_DECLARE(void) ap_random_insecure_bytes(void *buf, apr_size_t size)
{
#if APR_HAS_THREADS
if (rng_mutex)
apr_thread_mutex_lock(rng_mutex);
#endif
/* apr_random_insecure_bytes can only fail with APR_ENOTENOUGHENTROPY,
* and we have ruled that out during initialization. Therefore we don't
* ne... | Non-vul |
CVE-2016-9557 | int mif_validate(jas_stream_t *in)
{
uchar buf[MIF_MAGICLEN];
uint_fast32_t magic;
int i;
int n;
assert(JAS_STREAM_MAXPUTBACK >= MIF_MAGICLEN);
/* Read the validation data (i.e., the data used for detecting
the format). */
if ((n = jas_stream_read(in, buf, MIF_MAGICLEN)) < 0) {
return -1;
}
/* Put... | CWE-190 |
CVE-2017-5019 | bool RenderFrameImpl::ShouldDisplayErrorPageForFailedLoad(
int error_code,
const GURL& unreachable_url) {
if (error_code == net::ERR_ABORTED)
return false;
if (error_code == net::ERR_BLOCKED_BY_CLIENT &&
render_view_->renderer_preferences_.disable_client_blocked_error_page) {
return false;
... | Non-vul |
CVE-2016-5170 | Document& Document::TopDocument() const {
Document* doc = const_cast<Document*>(this);
for (HTMLFrameOwnerElement* element = doc->LocalOwner(); element;
element = doc->LocalOwner())
doc = &element->GetDocument();
DCHECK(doc);
return *doc;
}
| Non-vul |
CVE-2018-20553 | _our_safe_free(void *ptr, const char *funcname, const int line, const char *file)
{
assert(funcname);
assert(line);
assert(file);
if (ptr == NULL)
return;
free(ptr);
}
| Non-vul |
CVE-2016-5219 | void PassthroughResources::Destroy(gl::GLApi* api) {
bool have_context = !!api;
DeleteServiceObjects(&texture_id_map, have_context,
[this, api](GLuint client_id, GLuint texture) {
if (!texture_object_map.HasClientID(client_id)) {
api->glDele... | Non-vul |
CVE-2014-1715 | bool LayoutBlockFlow::updateLogicalWidthAndColumnWidth()
{
bool relayoutChildren = LayoutBlock::updateLogicalWidthAndColumnWidth();
if (LayoutMultiColumnFlowThread* flowThread = multiColumnFlowThread()) {
if (flowThread->needsNewWidth())
return true;
}
return relayoutChildren;
}
| Non-vul |
CVE-2016-7910 | static ssize_t disk_events_poll_msecs_show(struct device *dev,
struct device_attribute *attr,
char *buf)
{
struct gendisk *disk = dev_to_disk(dev);
return sprintf(buf, "%ld\n", disk->ev->poll_msecs);
}
| Non-vul |
CVE-2017-7854 | RList *r_bin_wasm_get_codes (RBinWasmObj *bin) {
RBinWasmSection *code = NULL;;
RList *codes = NULL;
if (!bin || !bin->g_sections) {
return NULL;
}
if (bin->g_codes) {
return bin->g_codes;
}
if (!(codes = r_bin_wasm_get_sections_by_id (bin->g_sections,
R_BIN_WASM_SECTION_CODE))) {
return r_list_ne... | Non-vul |
CVE-2017-5509 | static size_t WritePSDChannels(const PSDInfo *psd_info,
const ImageInfo *image_info,Image *image,Image *next_image,
MagickOffsetType size_offset,const MagickBooleanType separate,
ExceptionInfo *exception)
{
Image
*mask;
MagickOffsetType
rows_offset;
size_t
channels,
count,
length,
... | CWE-787 |
CVE-2014-3191 | void FrameView::performPreLayoutTasks()
{
TRACE_EVENT0("blink", "FrameView::performPreLayoutTasks");
lifecycle().advanceTo(DocumentLifecycle::InPreLayout);
TemporaryChange<bool> changeSchedulingEnabled(m_layoutSchedulingEnabled, false);
if (!m_nestedLayoutCount && !m_inSynchronousPostLayout && m_postL... | Non-vul |
CVE-2017-5019 | double RenderFrameImpl::GetZoomLevel() {
return render_view_->page_zoom_level();
}
| Non-vul |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- -