CVE ID
stringlengths
13
16
CVE Page
stringlengths
45
48
CWE ID
stringclasses
85 values
fixed_func
stringlengths
14
241k
func
stringlengths
14
241k
vul
int8
0
1
__index_level_0__
int64
0
151k
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-3103/
NOT_APPLICABLE
ewk_frame_scroll_size_get(const Evas_Object* ewkFrame, int* width, int* height) { if (width) *width = 0; if (height) *height = 0; EWK_FRAME_SD_GET_OR_RETURN(ewkFrame, smartData, false); EINA_SAFETY_ON_NULL_RETURN_VAL(smartData->frame, false); EINA_SAFETY_ON_NULL_RETURN_VAL(smartData-...
ewk_frame_scroll_size_get(const Evas_Object* ewkFrame, int* width, int* height) { if (width) *width = 0; if (height) *height = 0; EWK_FRAME_SD_GET_OR_RETURN(ewkFrame, smartData, false); EINA_SAFETY_ON_NULL_RETURN_VAL(smartData->frame, false); EINA_SAFETY_ON_NULL_RETURN_VAL(smartData-...
0
253
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2019-14463/
NOT_APPLICABLE
int modbus_flush(modbus_t *ctx) { int rc; if (ctx == NULL) { errno = EINVAL; return -1; } rc = ctx->backend->flush(ctx); if (rc != -1 && ctx->debug) { /* Not all backends are able to return the number of bytes flushed */ printf("Bytes flushed (%d)\n", rc); } ...
int modbus_flush(modbus_t *ctx) { int rc; if (ctx == NULL) { errno = EINVAL; return -1; } rc = ctx->backend->flush(ctx); if (rc != -1 && ctx->debug) { /* Not all backends are able to return the number of bytes flushed */ printf("Bytes flushed (%d)\n", rc); } ...
0
254
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-10708/
NOT_APPLICABLE
choose_comp(struct sshcomp *comp, char *client, char *server) { char *name = match_list(client, server, NULL); if (name == NULL) return SSH_ERR_NO_COMPRESS_ALG_MATCH; if (strcmp(name, "zlib@openssh.com") == 0) { comp->type = COMP_DELAYED; } else if (strcmp(name, "zlib") == 0) { comp->type = COMP_ZLIB; } els...
choose_comp(struct sshcomp *comp, char *client, char *server) { char *name = match_list(client, server, NULL); if (name == NULL) return SSH_ERR_NO_COMPRESS_ALG_MATCH; if (strcmp(name, "zlib@openssh.com") == 0) { comp->type = COMP_DELAYED; } else if (strcmp(name, "zlib") == 0) { comp->type = COMP_ZLIB; } els...
0
255
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-2861/
NOT_APPLICABLE
void RenderView::didReceiveResponse( WebFrame* frame, unsigned identifier, const WebURLResponse& response) { SiteIsolationMetrics::LogMimeTypeForCrossOriginRequest(frame, identifier, response); if...
void RenderView::didReceiveResponse( WebFrame* frame, unsigned identifier, const WebURLResponse& response) { SiteIsolationMetrics::LogMimeTypeForCrossOriginRequest(frame, identifier, response); if...
0
256
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-10196/
NOT_APPLICABLE
need_socktype_protocol_hack(void) { if (!tested_for_getaddrinfo_hacks) test_for_getaddrinfo_hacks(); return need_socktype_protocol_hack_; }
need_socktype_protocol_hack(void) { if (!tested_for_getaddrinfo_hacks) test_for_getaddrinfo_hacks(); return need_socktype_protocol_hack_; }
0
257
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2013-0918/
NOT_APPLICABLE
void RenderViewImpl::DidFlushPaint() { pepper_helper_->ViewFlushedPaint(); if (!webview()) return; WebFrame* main_frame = webview()->mainFrame(); if (!main_frame->provisionalDataSource()) { WebDataSource* ds = main_frame->dataSource(); DocumentState* document_state = DocumentState::FromDataSource...
void RenderViewImpl::DidFlushPaint() { pepper_helper_->ViewFlushedPaint(); if (!webview()) return; WebFrame* main_frame = webview()->mainFrame(); if (!main_frame->provisionalDataSource()) { WebDataSource* ds = main_frame->dataSource(); DocumentState* document_state = DocumentState::FromDataSource...
0
258
CVE-2016-2480
https://www.cvedetails.com/cve/CVE-2016-2480/
CWE-20
OMX_ERRORTYPE omx_venc::set_parameter(OMX_IN OMX_HANDLETYPE hComp, OMX_IN OMX_INDEXTYPE paramIndex, OMX_IN OMX_PTR paramData) { (void)hComp; OMX_ERRORTYPE eRet = OMX_ErrorNone; if (m_state == OMX_StateInvalid) { DEBUG_PRINT_ERROR("ERROR: Set Param in Invalid State"); return ...
OMX_ERRORTYPE omx_venc::set_parameter(OMX_IN OMX_HANDLETYPE hComp, OMX_IN OMX_INDEXTYPE paramIndex, OMX_IN OMX_PTR paramData) { (void)hComp; OMX_ERRORTYPE eRet = OMX_ErrorNone; if (m_state == OMX_StateInvalid) { DEBUG_PRINT_ERROR("ERROR: Set Param in Invalid State"); return ...
1
259
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-1683/
NOT_APPLICABLE
xsltStyleInitializeStylesheetModule(xsltStylesheetPtr style, const xmlChar * URI) { xsltExtDataPtr dataContainer; void *userData = NULL; xsltExtModulePtr module; if ((style == NULL) || (URI == NULL)) return(NULL); if (xsltExtensionsHash == NULL) { #ifdef WITH_XSLT_DEBUG_EXTENSIONS xsltG...
xsltStyleInitializeStylesheetModule(xsltStylesheetPtr style, const xmlChar * URI) { xsltExtDataPtr dataContainer; void *userData = NULL; xsltExtModulePtr module; if ((style == NULL) || (URI == NULL)) return(NULL); if (xsltExtensionsHash == NULL) { #ifdef WITH_XSLT_DEBUG_EXTENSIONS xsltG...
0
260
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-2351/
NOT_APPLICABLE
bool SyncBackendHost::Core::IsCurrentThreadSafeForModel( syncable::ModelType model_type) { base::AutoLock lock(host_->registrar_lock_); browser_sync::ModelSafeRoutingInfo::const_iterator routing_it = host_->registrar_.routing_info.find(model_type); if (routing_it == host_->registrar_.routing_info.end()...
bool SyncBackendHost::Core::IsCurrentThreadSafeForModel( syncable::ModelType model_type) { base::AutoLock lock(host_->registrar_lock_); browser_sync::ModelSafeRoutingInfo::const_iterator routing_it = host_->registrar_.routing_info.find(model_type); if (routing_it == host_->registrar_.routing_info.end()...
0
261
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-9438/
NOT_APPLICABLE
yysyntax_error (YYSIZE_T *yymsg_alloc, char **yymsg, yytype_int16 *yyssp, int yytoken) { YYSIZE_T yysize0 = yytnamerr (YY_NULLPTR, yytname[yytoken]); YYSIZE_T yysize = yysize0; enum { YYERROR_VERBOSE_ARGS_MAXIMUM = 5 }; /* Internationalized format string. */ const char *yyformat = YY_NULLPTR; ...
yysyntax_error (YYSIZE_T *yymsg_alloc, char **yymsg, yytype_int16 *yyssp, int yytoken) { YYSIZE_T yysize0 = yytnamerr (YY_NULLPTR, yytname[yytoken]); YYSIZE_T yysize = yysize0; enum { YYERROR_VERBOSE_ARGS_MAXIMUM = 5 }; /* Internationalized format string. */ const char *yyformat = YY_NULLPTR; ...
0
262
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2018-20067/
NOT_APPLICABLE
void LocalFrameClientImpl::AbortClientNavigation() { if (web_frame_->Client()) web_frame_->Client()->AbortClientNavigation(); }
void LocalFrameClientImpl::AbortClientNavigation() { if (web_frame_->Client()) web_frame_->Client()->AbortClientNavigation(); }
0
263
CVE-2011-4112
https://www.cvedetails.com/cve/CVE-2011-4112/
CWE-264
void bnep_net_setup(struct net_device *dev) { memset(dev->broadcast, 0xff, ETH_ALEN); dev->addr_len = ETH_ALEN; ether_setup(dev); dev->priv_flags &= ~IFF_TX_SKB_SHARING; dev->netdev_ops = &bnep_netdev_ops; dev->watchdog_timeo = HZ * 2; }
void bnep_net_setup(struct net_device *dev) { memset(dev->broadcast, 0xff, ETH_ALEN); dev->addr_len = ETH_ALEN; ether_setup(dev); dev->netdev_ops = &bnep_netdev_ops; dev->watchdog_timeo = HZ * 2; }
1
264
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2015-1296/
NOT_APPLICABLE
void DownloadController::Init(JNIEnv* env, jobject obj) { java_object_ = new JavaObject; java_object_->obj_ = env->NewWeakGlobalRef(obj); }
void DownloadController::Init(JNIEnv* env, jobject obj) { java_object_ = new JavaObject; java_object_->obj_ = env->NewWeakGlobalRef(obj); }
0
265
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-3699/
NOT_APPLICABLE
dump_kernel_offset(struct notifier_block *self, unsigned long v, void *p) { if (kaslr_enabled()) { pr_emerg("Kernel Offset: 0x%lx from 0x%lx (relocation range: 0x%lx-0x%lx)\n", kaslr_offset(), __START_KERNEL, __START_KERNEL_map, MODULES_VADDR-1); } else { pr_emerg("Kernel Offset: disabled\n"); } ...
dump_kernel_offset(struct notifier_block *self, unsigned long v, void *p) { if (kaslr_enabled()) { pr_emerg("Kernel Offset: 0x%lx from 0x%lx (relocation range: 0x%lx-0x%lx)\n", kaslr_offset(), __START_KERNEL, __START_KERNEL_map, MODULES_VADDR-1); } else { pr_emerg("Kernel Offset: disabled\n"); } ...
0
266
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-1586/
NOT_APPLICABLE
bool WebContext::popupBlockerEnabled() const { if (IsInitialized()) { return context_->IsPopupBlockerEnabled(); } return construct_props_->popup_blocker_enabled; }
bool WebContext::popupBlockerEnabled() const { if (IsInitialized()) { return context_->IsPopupBlockerEnabled(); } return construct_props_->popup_blocker_enabled; }
0
268
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-7539/
NOT_APPLICABLE
static inline MagickBooleanType AcquireCacheNexusPixels( const CacheInfo *magick_restrict cache_info,NexusInfo *nexus_info, ExceptionInfo *exception) { if (nexus_info->length != (MagickSizeType) ((size_t) nexus_info->length)) return(MagickFalse); nexus_info->mapped=MagickFalse; nexus_info->cache=(PixelPac...
static inline MagickBooleanType AcquireCacheNexusPixels( const CacheInfo *magick_restrict cache_info,NexusInfo *nexus_info, ExceptionInfo *exception) { if (nexus_info->length != (MagickSizeType) ((size_t) nexus_info->length)) return(MagickFalse); nexus_info->mapped=MagickFalse; nexus_info->cache=(PixelPac...
0
269
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-5125/
NOT_APPLICABLE
void PushMessagingServiceImpl::IncreasePushSubscriptionCount(int add, bool is_pending) { DCHECK_GT(add, 0); if (push_subscription_count_ + pending_push_subscription_count_ == 0) { GetGCMDriver()->AddAppHandler(kPushMessagingAppIdentifierPrefix, this);...
void PushMessagingServiceImpl::IncreasePushSubscriptionCount(int add, bool is_pending) { DCHECK_GT(add, 0); if (push_subscription_count_ + pending_push_subscription_count_ == 0) { GetGCMDriver()->AddAppHandler(kPushMessagingAppIdentifierPrefix, this);...
0
270
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-1658/
NOT_APPLICABLE
const char* ExtensionOptionsGuest::GetAPINamespace() const { return extensionoptions::kAPINamespace; }
const char* ExtensionOptionsGuest::GetAPINamespace() const { return extensionoptions::kAPINamespace; }
0
271
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-14058/
NOT_APPLICABLE
static int set_stream_info_from_input_stream(AVStream *st, struct playlist *pls, AVStream *ist) { int err; err = avcodec_parameters_copy(st->codecpar, ist->codecpar); if (err < 0) return err; if (pls->is_id3_timestamped) /* custom timestamps via id3 */ avpriv_set_pts_info(st, 33, 1, MP...
static int set_stream_info_from_input_stream(AVStream *st, struct playlist *pls, AVStream *ist) { int err; err = avcodec_parameters_copy(st->codecpar, ist->codecpar); if (err < 0) return err; if (pls->is_id3_timestamped) /* custom timestamps via id3 */ avpriv_set_pts_info(st, 33, 1, MP...
0
272
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2015-1539/
NOT_APPLICABLE
status_t ESDS::InitCheck() const { return mInitCheck; }
status_t ESDS::InitCheck() const { return mInitCheck; }
0
273
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2019-5790/
NOT_APPLICABLE
void HTMLFormElement::ParseAttribute( const AttributeModificationParams& params) { const QualifiedName& name = params.name; if (name == actionAttr) { attributes_.ParseAction(params.new_value); LogUpdateAttributeIfIsolatedWorldAndInDocument("form", params); if (GetDocument().GetInsecureRequestPolicy...
void HTMLFormElement::ParseAttribute( const AttributeModificationParams& params) { const QualifiedName& name = params.name; if (name == actionAttr) { attributes_.ParseAction(params.new_value); LogUpdateAttributeIfIsolatedWorldAndInDocument("form", params); if (GetDocument().GetInsecureRequestPolicy...
0
274
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-3896/
NOT_APPLICABLE
content::JavaScriptDialogCreator* Browser::GetJavaScriptDialogCreator() { return GetJavaScriptDialogCreatorInstance(); }
content::JavaScriptDialogCreator* Browser::GetJavaScriptDialogCreator() { return GetJavaScriptDialogCreatorInstance(); }
0
275
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2012-3552/
NOT_APPLICABLE
int ip_setsockopt(struct sock *sk, int level, int optname, char __user *optval, unsigned int optlen) { int err; if (level != SOL_IP) return -ENOPROTOOPT; err = do_ip_setsockopt(sk, level, optname, optval, optlen); #ifdef CONFIG_NETFILTER /* we need to exclude all possible ENOPROTOOPTs except default case */ ...
int ip_setsockopt(struct sock *sk, int level, int optname, char __user *optval, unsigned int optlen) { int err; if (level != SOL_IP) return -ENOPROTOOPT; err = do_ip_setsockopt(sk, level, optname, optval, optlen); #ifdef CONFIG_NETFILTER /* we need to exclude all possible ENOPROTOOPTs except default case */ ...
0
276
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-5219/
NOT_APPLICABLE
GLenum GLES2DecoderImpl::GetBoundColorDrawBufferInternalFormat( GLint drawbuffer_i) { DCHECK(drawbuffer_i >= 0 && drawbuffer_i < static_cast<GLint>(group_->max_draw_buffers())); Framebuffer* framebuffer = GetBoundDrawFramebuffer(); if (!framebuffer) { return 0; } GLenum drawbuffer = static_ca...
GLenum GLES2DecoderImpl::GetBoundColorDrawBufferInternalFormat( GLint drawbuffer_i) { DCHECK(drawbuffer_i >= 0 && drawbuffer_i < static_cast<GLint>(group_->max_draw_buffers())); Framebuffer* framebuffer = GetBoundDrawFramebuffer(); if (!framebuffer) { return 0; } GLenum drawbuffer = static_ca...
0
277
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-5016/
NOT_APPLICABLE
void HTMLFormControlElement::willChangeForm() { ListedElement::willChangeForm(); formOwnerSetNeedsValidityCheck(); if (formOwner() && canBeSuccessfulSubmitButton()) formOwner()->invalidateDefaultButtonStyle(); }
void HTMLFormControlElement::willChangeForm() { ListedElement::willChangeForm(); formOwnerSetNeedsValidityCheck(); if (formOwner() && canBeSuccessfulSubmitButton()) formOwner()->invalidateDefaultButtonStyle(); }
0
279
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-12663/
NOT_APPLICABLE
ModuleExport size_t RegisterMAPImage(void) { MagickInfo *entry; entry=SetMagickInfo("MAP"); entry->decoder=(DecodeImageHandler *) ReadMAPImage; entry->encoder=(EncodeImageHandler *) WriteMAPImage; entry->adjoin=MagickFalse; entry->format_type=ExplicitFormatType; entry->raw=MagickTrue; entry->endian...
ModuleExport size_t RegisterMAPImage(void) { MagickInfo *entry; entry=SetMagickInfo("MAP"); entry->decoder=(DecodeImageHandler *) ReadMAPImage; entry->encoder=(EncodeImageHandler *) WriteMAPImage; entry->adjoin=MagickFalse; entry->format_type=ExplicitFormatType; entry->raw=MagickTrue; entry->endian...
0
280
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-8924/
NOT_APPLICABLE
static int do_boot_mode(struct edgeport_serial *serial, const struct firmware *fw) { struct device *dev = &serial->serial->interface->dev; int status = 0; struct edge_ti_manuf_descriptor *ti_manuf_desc; struct edgeport_fw_hdr *fw_hdr = (struct edgeport_fw_hdr *)fw->data; dev_dbg(dev, "%s - RUNNING IN BOOT MODE\...
static int do_boot_mode(struct edgeport_serial *serial, const struct firmware *fw) { struct device *dev = &serial->serial->interface->dev; int status = 0; struct edge_ti_manuf_descriptor *ti_manuf_desc; struct edgeport_fw_hdr *fw_hdr = (struct edgeport_fw_hdr *)fw->data; dev_dbg(dev, "%s - RUNNING IN BOOT MODE\...
0
281
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-1477/
NOT_APPLICABLE
static void opl3_volume_method(int dev, int mode) { }
static void opl3_volume_method(int dev, int mode) { }
0
282
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2014-2669/
NOT_APPLICABLE
signconsistent(QUERYTYPE *query, BITVEC sign, bool calcnot) { return execute(GETQUERY(query) + query->size - 1, (void *) sign, calcnot, checkcondition_bit); }
signconsistent(QUERYTYPE *query, BITVEC sign, bool calcnot) { return execute(GETQUERY(query) + query->size - 1, (void *) sign, calcnot, checkcondition_bit); }
0
284
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2014-3191/
NOT_APPLICABLE
IntRect RenderLayerScrollableArea::visibleContentRect(IncludeScrollbarsInRect scrollbarInclusion) const { int verticalScrollbarWidth = 0; int horizontalScrollbarHeight = 0; if (scrollbarInclusion == IncludeScrollbars) { verticalScrollbarWidth = (verticalScrollbar() && !verticalScrollbar()->isOverlay...
IntRect RenderLayerScrollableArea::visibleContentRect(IncludeScrollbarsInRect scrollbarInclusion) const { int verticalScrollbarWidth = 0; int horizontalScrollbarHeight = 0; if (scrollbarInclusion == IncludeScrollbars) { verticalScrollbarWidth = (verticalScrollbar() && !verticalScrollbar()->isOverlay...
0
286
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-2860/
NOT_APPLICABLE
dumpEntry(struct rx_call *call, afs_int32 apos, struct prdebugentry *aentry, afs_int32 *cid) { afs_int32 code; struct ubik_trans *tt; code = Initdb(); if (code != PRSUCCESS) return code; code = ubik_BeginTransReadAny(dbase, UBIK_READTRANS, &tt); if (code) return code; code = ubik_SetLo...
dumpEntry(struct rx_call *call, afs_int32 apos, struct prdebugentry *aentry, afs_int32 *cid) { afs_int32 code; struct ubik_trans *tt; code = Initdb(); if (code != PRSUCCESS) return code; code = ubik_BeginTransReadAny(dbase, UBIK_READTRANS, &tt); if (code) return code; code = ubik_SetLo...
0
287
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2018-1000040/
NOT_APPLICABLE
indexed_to_alt(fz_context *ctx, const fz_colorspace *cs, const float *color, float *alt) { struct indexed *idx = cs->data; int i, k; int n = idx->base->n; i = color[0] * 255; i = fz_clampi(i, 0, idx->high); for (k = 0; k < n; k++) alt[k] = idx->lookup[i * n + k] / 255.0f; }
indexed_to_alt(fz_context *ctx, const fz_colorspace *cs, const float *color, float *alt) { struct indexed *idx = cs->data; int i, k; int n = idx->base->n; i = color[0] * 255; i = fz_clampi(i, 0, idx->high); for (k = 0; k < n; k++) alt[k] = idx->lookup[i * n + k] / 255.0f; }
0
288
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2015-6768/
NOT_APPLICABLE
void Document::updateLayoutTreeForNodeIfNeeded(Node* node) { ASSERT(node); if (!node->canParticipateInComposedTree()) return; if (!needsLayoutTreeUpdate()) return; if (!node->inDocument()) return; bool needsRecalc = needsFullLayoutTreeUpdate() || node->needsStyleRecalc() || ...
void Document::updateLayoutTreeForNodeIfNeeded(Node* node) { ASSERT(node); if (!node->canParticipateInComposedTree()) return; if (!needsLayoutTreeUpdate()) return; if (!node->inDocument()) return; bool needsRecalc = needsFullLayoutTreeUpdate() || node->needsStyleRecalc() || ...
0
289
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2018-20182/
NOT_APPLICABLE
rdp_out_colcache_caps(STREAM s) { out_uint16_le(s, RDP_CAPSET_COLCACHE); out_uint16_le(s, RDP_CAPLEN_COLCACHE); out_uint16_le(s, 6); /* cache size */ out_uint16(s, 0); /* pad */ }
rdp_out_colcache_caps(STREAM s) { out_uint16_le(s, RDP_CAPSET_COLCACHE); out_uint16_le(s, RDP_CAPLEN_COLCACHE); out_uint16_le(s, 6); /* cache size */ out_uint16(s, 0); /* pad */ }
0
290
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-18234/
NOT_APPLICABLE
ImportTIFF_CheckStandardMapping ( const TIFF_Manager::TagInfo & tagInfo, const TIFF_MappingToXMP & mapInfo ) { XMP_Assert ( (kTIFF_ByteType <= tagInfo.type) && (tagInfo.type <= kTIFF_LastType) ); XMP_Assert ( mapInfo.type <= kTIFF_LastType ); if ( (tagInfo.type < kTIFF_ByteType) || (tagInfo.type > kTIFF_LastType) )...
ImportTIFF_CheckStandardMapping ( const TIFF_Manager::TagInfo & tagInfo, const TIFF_MappingToXMP & mapInfo ) { XMP_Assert ( (kTIFF_ByteType <= tagInfo.type) && (tagInfo.type <= kTIFF_LastType) ); XMP_Assert ( mapInfo.type <= kTIFF_LastType ); if ( (tagInfo.type < kTIFF_ByteType) || (tagInfo.type > kTIFF_LastType) )...
0
291
CVE-2016-9537
https://www.cvedetails.com/cve/CVE-2016-9537/
CWE-787
horizontalDifference16(unsigned short *ip, int n, int stride, unsigned short *wp, uint16 *From14) { register int r1, g1, b1, a1, r2, g2, b2, a2, mask; /* assumption is unsigned pixel values */ #undef CLAMP #define CLAMP(v) From14[(v) >> 2] mask = CODE_MASK; if (n >= stride) { if (stride == 3) { ...
horizontalDifference16(unsigned short *ip, int n, int stride, unsigned short *wp, uint16 *From14) { register int r1, g1, b1, a1, r2, g2, b2, a2, mask; /* assumption is unsigned pixel values */ #undef CLAMP #define CLAMP(v) From14[(v) >> 2] mask = CODE_MASK; if (n >= stride) { if (stride == 3) { ...
1
292
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-10192/
NOT_APPLICABLE
static void start_multicast(void) { FFServerStream *stream; char session_id[32]; HTTPContext *rtp_c; struct sockaddr_in dest_addr = {0}; int default_port, stream_index; unsigned int random0, random1; default_port = 6000; for(stream = config.first_stream; stream; stream = stream->next) {...
static void start_multicast(void) { FFServerStream *stream; char session_id[32]; HTTPContext *rtp_c; struct sockaddr_in dest_addr = {0}; int default_port, stream_index; unsigned int random0, random1; default_port = 6000; for(stream = config.first_stream; stream; stream = stream->next) {...
0
293
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2015-2150/
NOT_APPLICABLE
static int xen_pcibk_read_device(struct pci_dev *dev, int offset, u16 *value, void *data) { *value = dev->device; return 0; }
static int xen_pcibk_read_device(struct pci_dev *dev, int offset, u16 *value, void *data) { *value = dev->device; return 0; }
0
294
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2018-19198/
NOT_APPLICABLE
void testRangeComparison_RemoveBaseUri_Issue19() { testRemoveBaseUriHelper("scheme://host/source", "scheme://host/source", "schemelonger://host/base"); testRemoveBaseUriHelper("schemelonger://host/source", "schemelonger://host/source", "scheme://host/base"); testRemoveBaseUriHelp...
void testRangeComparison_RemoveBaseUri_Issue19() { testRemoveBaseUriHelper("scheme://host/source", "scheme://host/source", "schemelonger://host/base"); testRemoveBaseUriHelper("schemelonger://host/source", "schemelonger://host/source", "scheme://host/base"); testRemoveBaseUriHelp...
0
295
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2014-4503/
NOT_APPLICABLE
static bool sock_connecting(void) { #ifndef WIN32 return errno == EINPROGRESS; #else return WSAGetLastError() == WSAEWOULDBLOCK; #endif }
static bool sock_connecting(void) { #ifndef WIN32 return errno == EINPROGRESS; #else return WSAGetLastError() == WSAEWOULDBLOCK; #endif }
0
297
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2015-3412/
NOT_APPLICABLE
static PHP_FUNCTION(xmlwriter_start_element_ns) { zval *pind; xmlwriter_object *intern; xmlTextWriterPtr ptr; char *name, *prefix, *uri; int name_len, prefix_len, uri_len, retval; #ifdef ZEND_ENGINE_2 zval *this = getThis(); if (this) { if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s!ss!", &prefix...
static PHP_FUNCTION(xmlwriter_start_element_ns) { zval *pind; xmlwriter_object *intern; xmlTextWriterPtr ptr; char *name, *prefix, *uri; int name_len, prefix_len, uri_len, retval; #ifdef ZEND_ENGINE_2 zval *this = getThis(); if (this) { if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s!ss!", &prefix...
0
298
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-7645/
NOT_APPLICABLE
static int nfsd_startup_net(int nrservs, struct net *net) { struct nfsd_net *nn = net_generic(net, nfsd_net_id); int ret; if (nn->nfsd_net_up) return 0; ret = nfsd_startup_generic(nrservs); if (ret) return ret; ret = nfsd_init_socks(net); if (ret) goto out_socks; if (nfsd_needs_lockd() && !nn->lockd_up...
static int nfsd_startup_net(int nrservs, struct net *net) { struct nfsd_net *nn = net_generic(net, nfsd_net_id); int ret; if (nn->nfsd_net_up) return 0; ret = nfsd_startup_generic(nrservs); if (ret) return ret; ret = nfsd_init_socks(net); if (ret) goto out_socks; if (nfsd_needs_lockd() && !nn->lockd_up...
0
301
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-4112/
NOT_APPLICABLE
int vlan_dev_change_flags(const struct net_device *dev, u32 flags, u32 mask) { struct vlan_dev_info *vlan = vlan_dev_info(dev); u32 old_flags = vlan->flags; if (mask & ~(VLAN_FLAG_REORDER_HDR | VLAN_FLAG_GVRP | VLAN_FLAG_LOOSE_BINDING)) return -EINVAL; vlan->flags = (old_flags & ~mask) | (flags & mask); ...
int vlan_dev_change_flags(const struct net_device *dev, u32 flags, u32 mask) { struct vlan_dev_info *vlan = vlan_dev_info(dev); u32 old_flags = vlan->flags; if (mask & ~(VLAN_FLAG_REORDER_HDR | VLAN_FLAG_GVRP | VLAN_FLAG_LOOSE_BINDING)) return -EINVAL; vlan->flags = (old_flags & ~mask) | (flags & mask); ...
0
302
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2018-6085/
NOT_APPLICABLE
void BackendImpl::RemoveEntry(EntryImpl* entry) { #if defined(NET_BUILD_STRESS_CACHE) NotLinked(entry); #endif if (!new_eviction_) return; DCHECK_NE(ENTRY_NORMAL, entry->entry()->Data()->state); Trace("Remove entry 0x%p", entry); eviction_.OnDestroyEntry(entry); DecreaseNumEntries(); }
void BackendImpl::RemoveEntry(EntryImpl* entry) { #if defined(NET_BUILD_STRESS_CACHE) NotLinked(entry); #endif if (!new_eviction_) return; DCHECK_NE(ENTRY_NORMAL, entry->entry()->Data()->state); Trace("Remove entry 0x%p", entry); eviction_.OnDestroyEntry(entry); DecreaseNumEntries(); }
0
303
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-4098/
NOT_APPLICABLE
static int do_gfs2_set_flags(struct file *filp, u32 reqflags, u32 mask) { struct inode *inode = filp->f_path.dentry->d_inode; struct gfs2_inode *ip = GFS2_I(inode); struct gfs2_sbd *sdp = GFS2_SB(inode); struct buffer_head *bh; struct gfs2_holder gh; int error; u32 new_flags, flags; error = mnt_want_write(filp...
static int do_gfs2_set_flags(struct file *filp, u32 reqflags, u32 mask) { struct inode *inode = filp->f_path.dentry->d_inode; struct gfs2_inode *ip = GFS2_I(inode); struct gfs2_sbd *sdp = GFS2_SB(inode); struct buffer_head *bh; struct gfs2_holder gh; int error; u32 new_flags, flags; error = mnt_want_write(filp...
0
304
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-4131/
NOT_APPLICABLE
static int _nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid, int issync) { struct nfs4_delegreturndata *data; struct nfs_server *server = NFS_SERVER(inode); struct rpc_task *task; struct rpc_message msg = { .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DELEGRETURN], .r...
static int _nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid, int issync) { struct nfs4_delegreturndata *data; struct nfs_server *server = NFS_SERVER(inode); struct rpc_task *task; struct rpc_message msg = { .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DELEGRETURN], .r...
0
305
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2018-13006/
NOT_APPLICABLE
GF_Err tfxd_Size(GF_Box *s) { s->size += 20; return GF_OK; }
GF_Err tfxd_Size(GF_Box *s) { s->size += 20; return GF_OK; }
0
308
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-17862/
NOT_APPLICABLE
static bool type_is_pkt_pointer(enum bpf_reg_type type) { return type == PTR_TO_PACKET || type == PTR_TO_PACKET_META; }
static bool type_is_pkt_pointer(enum bpf_reg_type type) { return type == PTR_TO_PACKET || type == PTR_TO_PACKET_META; }
0
309
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2008-7316/
NOT_APPLICABLE
unsigned find_get_pages_tag(struct address_space *mapping, pgoff_t *index, int tag, unsigned int nr_pages, struct page **pages) { unsigned int i; unsigned int ret; read_lock_irq(&mapping->tree_lock); ret = radix_tree_gang_lookup_tag(&mapping->page_tree, (void **)pages, *index, nr_pages, tag); for (i = 0; i...
unsigned find_get_pages_tag(struct address_space *mapping, pgoff_t *index, int tag, unsigned int nr_pages, struct page **pages) { unsigned int i; unsigned int ret; read_lock_irq(&mapping->tree_lock); ret = radix_tree_gang_lookup_tag(&mapping->page_tree, (void **)pages, *index, nr_pages, tag); for (i = 0; i...
0
311
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-9919/
NOT_APPLICABLE
static void icmpv6_err(struct sk_buff *skb, struct inet6_skb_parm *opt, u8 type, u8 code, int offset, __be32 info) { /* icmpv6_notify checks 8 bytes can be pulled, icmp6hdr is 8 bytes */ struct icmp6hdr *icmp6 = (struct icmp6hdr *) (skb->data + offset); struct net *net = dev_net(skb->dev); if (type == ICM...
static void icmpv6_err(struct sk_buff *skb, struct inet6_skb_parm *opt, u8 type, u8 code, int offset, __be32 info) { /* icmpv6_notify checks 8 bytes can be pulled, icmp6hdr is 8 bytes */ struct icmp6hdr *icmp6 = (struct icmp6hdr *) (skb->data + offset); struct net *net = dev_net(skb->dev); if (type == ICM...
0
312
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-7418/
NOT_APPLICABLE
MODRET set_timeoutlogin(cmd_rec *cmd) { int timeout = -1; config_rec *c = NULL; CHECK_ARGS(cmd, 1); CHECK_CONF(cmd, CONF_ROOT|CONF_VIRTUAL|CONF_GLOBAL); if (pr_str_get_duration(cmd->argv[1], &timeout) < 0) { CONF_ERROR(cmd, pstrcat(cmd->tmp_pool, "error parsing timeout value '", cmd->argv[1], "': ...
MODRET set_timeoutlogin(cmd_rec *cmd) { int timeout = -1; config_rec *c = NULL; CHECK_ARGS(cmd, 1); CHECK_CONF(cmd, CONF_ROOT|CONF_VIRTUAL|CONF_GLOBAL); if (pr_str_get_duration(cmd->argv[1], &timeout) < 0) { CONF_ERROR(cmd, pstrcat(cmd->tmp_pool, "error parsing timeout value '", cmd->argv[1], "': ...
0
313
CVE-2009-3605
https://www.cvedetails.com/cve/CVE-2009-3605/
CWE-189
void GfxImageColorMap::getRGBLine(Guchar *in, unsigned int *out, int length) { int i, j; Guchar *inp, *tmp_line; switch (colorSpace->getMode()) { case csIndexed: case csSeparation: tmp_line = (Guchar *) gmallocn (length, nComps2); for (i = 0; i < length; i++) { for (j = 0; j < nComps2; j++...
void GfxImageColorMap::getRGBLine(Guchar *in, unsigned int *out, int length) { int i, j; Guchar *inp, *tmp_line; switch (colorSpace->getMode()) { case csIndexed: case csSeparation: tmp_line = (Guchar *) gmalloc (length * nComps2); for (i = 0; i < length; i++) { for (j = 0; j < nComps2; j++...
1
314
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2018-10717/
NOT_APPLICABLE
static u8 GetByte(struct ngiflib_gif * g) { #ifndef NGIFLIB_NO_FILE if(g->mode & NGIFLIB_MODE_FROM_MEM) { #endif /* NGIFLIB_NO_FILE */ return *(g->input.bytes++); #ifndef NGIFLIB_NO_FILE } else { return (u8)(getc(g->input.file)); } #endif /* NGIFLIB_NO_FILE */ }
static u8 GetByte(struct ngiflib_gif * g) { #ifndef NGIFLIB_NO_FILE if(g->mode & NGIFLIB_MODE_FROM_MEM) { #endif /* NGIFLIB_NO_FILE */ return *(g->input.bytes++); #ifndef NGIFLIB_NO_FILE } else { return (u8)(getc(g->input.file)); } #endif /* NGIFLIB_NO_FILE */ }
0
315
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-1180/
NOT_APPLICABLE
static int iriap_data_indication(void *instance, void *sap, struct sk_buff *skb) { struct iriap_cb *self; __u8 *frame; __u8 opcode; IRDA_DEBUG(3, "%s()\n", __func__); self = (struct iriap_cb *) instance; IRDA_ASSERT(skb != NULL, return 0;); IRDA_ASSERT(self != NULL, goto out;); IRDA_ASSERT(self->magic...
static int iriap_data_indication(void *instance, void *sap, struct sk_buff *skb) { struct iriap_cb *self; __u8 *frame; __u8 opcode; IRDA_DEBUG(3, "%s()\n", __func__); self = (struct iriap_cb *) instance; IRDA_ASSERT(skb != NULL, return 0;); IRDA_ASSERT(self != NULL, goto out;); IRDA_ASSERT(self->magic...
0
319
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-3104/
NOT_APPLICABLE
void ExtensionSettingsHandler::RegisterUserPrefs(PrefService* prefs) { prefs->RegisterBooleanPref(prefs::kExtensionsUIDeveloperMode, false, PrefService::SYNCABLE_PREF); }
void ExtensionSettingsHandler::RegisterUserPrefs(PrefService* prefs) { prefs->RegisterBooleanPref(prefs::kExtensionsUIDeveloperMode, false, PrefService::SYNCABLE_PREF); }
0
320
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-4127/
NOT_APPLICABLE
static int flakey_end_io(struct dm_target *ti, struct bio *bio, int error, union map_info *map_context) { struct flakey_c *fc = ti->private; unsigned bio_submitted_while_down = map_context->ll; /* * Corrupt successful READs while in down state. * If flags were specified, only corrupt those that match. */ ...
static int flakey_end_io(struct dm_target *ti, struct bio *bio, int error, union map_info *map_context) { struct flakey_c *fc = ti->private; unsigned bio_submitted_while_down = map_context->ll; /* * Corrupt successful READs while in down state. * If flags were specified, only corrupt those that match. */ ...
0
322
CVE-2012-5148
https://www.cvedetails.com/cve/CVE-2012-5148/
CWE-20
void TabContentsContainerGtk::DetachTab(TabContents* tab) { void TabContentsContainerGtk::DetachTab(WebContents* tab) { gfx::NativeView widget = tab->GetNativeView(); if (widget) { GtkWidget* parent = gtk_widget_get_parent(widget); if (parent) { DCHECK_EQ(parent, expanded_); gtk_container_remo...
void TabContentsContainerGtk::DetachTab(TabContents* tab) { gfx::NativeView widget = tab->web_contents()->GetNativeView(); if (widget) { GtkWidget* parent = gtk_widget_get_parent(widget); if (parent) { DCHECK_EQ(parent, expanded_); gtk_container_remove(GTK_CONTAINER(expanded_), widget); } ...
1
323
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2012-6704/
NOT_APPLICABLE
void cred_to_ucred(struct pid *pid, const struct cred *cred, struct ucred *ucred) { ucred->pid = pid_vnr(pid); ucred->uid = ucred->gid = -1; if (cred) { struct user_namespace *current_ns = current_user_ns(); ucred->uid = user_ns_map_uid(current_ns, cred, cred->euid); ucred->gid = user_ns_map_gid(current_...
void cred_to_ucred(struct pid *pid, const struct cred *cred, struct ucred *ucred) { ucred->pid = pid_vnr(pid); ucred->uid = ucred->gid = -1; if (cred) { struct user_namespace *current_ns = current_user_ns(); ucred->uid = user_ns_map_uid(current_ns, cred, cred->euid); ucred->gid = user_ns_map_gid(current_...
0
324
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2018-17467/
NOT_APPLICABLE
void RenderWidgetHostImpl::WasHidden() { if (is_hidden_) return; RejectMouseLockOrUnlockIfNecessary(); TRACE_EVENT0("renderer_host", "RenderWidgetHostImpl::WasHidden"); is_hidden_ = true; visual_properties_ack_pending_ = false; StopInputEventAckTimeout(); Send(new ViewMsg_WasHidden(routing_id_));...
void RenderWidgetHostImpl::WasHidden() { if (is_hidden_) return; RejectMouseLockOrUnlockIfNecessary(); TRACE_EVENT0("renderer_host", "RenderWidgetHostImpl::WasHidden"); is_hidden_ = true; visual_properties_ack_pending_ = false; StopInputEventAckTimeout(); Send(new ViewMsg_WasHidden(routing_id_));...
0
325
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-6991/
NOT_APPLICABLE
static int backupTruncateFile(sqlite3_file *pFile, i64 iSize){ i64 iCurrent; int rc = sqlite3OsFileSize(pFile, &iCurrent); if( rc==SQLITE_OK && iCurrent>iSize ){ rc = sqlite3OsTruncate(pFile, iSize); } return rc; }
static int backupTruncateFile(sqlite3_file *pFile, i64 iSize){ i64 iCurrent; int rc = sqlite3OsFileSize(pFile, &iCurrent); if( rc==SQLITE_OK && iCurrent>iSize ){ rc = sqlite3OsTruncate(pFile, iSize); } return rc; }
0
326
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2018-20856/
NOT_APPLICABLE
static void ioc_set_batching(struct request_queue *q, struct io_context *ioc) { if (!ioc || ioc_batching(q, ioc)) return; ioc->nr_batch_requests = q->nr_batching; ioc->last_waited = jiffies; }
static void ioc_set_batching(struct request_queue *q, struct io_context *ioc) { if (!ioc || ioc_batching(q, ioc)) return; ioc->nr_batch_requests = q->nr_batching; ioc->last_waited = jiffies; }
0
327
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-12168/
NOT_APPLICABLE
static void reset_amair_el1(struct kvm_vcpu *vcpu, const struct sys_reg_desc *r) { vcpu_sys_reg(vcpu, AMAIR_EL1) = read_sysreg(amair_el1); }
static void reset_amair_el1(struct kvm_vcpu *vcpu, const struct sys_reg_desc *r) { vcpu_sys_reg(vcpu, AMAIR_EL1) = read_sysreg(amair_el1); }
0
328
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2015-1335/
NOT_APPLICABLE
static int instantiate_phys(struct lxc_handler *handler, struct lxc_netdev *netdev) { if (!netdev->link) { ERROR("no link specified for the physical interface"); return -1; } netdev->ifindex = if_nametoindex(netdev->link); if (!netdev->ifindex) { ERROR("failed to retrieve the index for %s", netdev->link); ...
static int instantiate_phys(struct lxc_handler *handler, struct lxc_netdev *netdev) { if (!netdev->link) { ERROR("no link specified for the physical interface"); return -1; } netdev->ifindex = if_nametoindex(netdev->link); if (!netdev->ifindex) { ERROR("failed to retrieve the index for %s", netdev->link); ...
0
331
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2013-1929/
NOT_APPLICABLE
static int tg3_run_loopback(struct tg3 *tp, u32 pktsz, bool tso_loopback) { u32 rx_start_idx, rx_idx, tx_idx, opaque_key; u32 base_flags = 0, mss = 0, desc_idx, coal_now, data_off, val; u32 budget; struct sk_buff *skb; u8 *tx_data, *rx_data; dma_addr_t map; int num_pkts, tx_len, rx_len, i, err; struct tg3_rx_bu...
static int tg3_run_loopback(struct tg3 *tp, u32 pktsz, bool tso_loopback) { u32 rx_start_idx, rx_idx, tx_idx, opaque_key; u32 base_flags = 0, mss = 0, desc_idx, coal_now, data_off, val; u32 budget; struct sk_buff *skb; u8 *tx_data, *rx_data; dma_addr_t map; int num_pkts, tx_len, rx_len, i, err; struct tg3_rx_bu...
0
333
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-6303/
NOT_APPLICABLE
main() { unsigned char md[MDC2_DIGEST_LENGTH]; int i; MDC2_CTX c; static char *text = "Now is the time for all "; MDC2_Init(&c); MDC2_Update(&c, text, strlen(text)); MDC2_Final(&(md[0]), &c); for (i = 0; i < MDC2_DIGEST_LENGTH; i++) printf("%02X", md[i]); printf("\n"); }
main() { unsigned char md[MDC2_DIGEST_LENGTH]; int i; MDC2_CTX c; static char *text = "Now is the time for all "; MDC2_Init(&c); MDC2_Update(&c, text, strlen(text)); MDC2_Final(&(md[0]), &c); for (i = 0; i < MDC2_DIGEST_LENGTH; i++) printf("%02X", md[i]); printf("\n"); }
0
334
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2012-2890/
NOT_APPLICABLE
void UrlFetcher::Core::OnResponseStarted(net::URLRequest* request) { DCHECK_EQ(request, request_.get()); DCHECK(network_task_runner_->BelongsToCurrentThread()); ReadResponse(); }
void UrlFetcher::Core::OnResponseStarted(net::URLRequest* request) { DCHECK_EQ(request, request_.get()); DCHECK(network_task_runner_->BelongsToCurrentThread()); ReadResponse(); }
0
336
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-6836/
NOT_APPLICABLE
static void vmxnet3_put_ring_to_file(QEMUFile *f, Vmxnet3Ring *r) { qemu_put_be64(f, r->pa); qemu_put_be32(f, r->size); qemu_put_be32(f, r->cell_size); qemu_put_be32(f, r->next); qemu_put_byte(f, r->gen); }
static void vmxnet3_put_ring_to_file(QEMUFile *f, Vmxnet3Ring *r) { qemu_put_be64(f, r->pa); qemu_put_be32(f, r->size); qemu_put_be32(f, r->cell_size); qemu_put_be32(f, r->next); qemu_put_byte(f, r->gen); }
0
337
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-3078/
NOT_APPLICABLE
static ZIPARCHIVE_METHOD(setExternalAttributesName) { struct zip *intern; zval *self = getThis(); size_t name_len; char *name; zend_long flags=0, opsys, attr; zip_int64_t idx; if (!self) { RETURN_FALSE; } ZIP_FROM_OBJECT(intern, self); if (zend_parse_parameters(ZEND_NUM_ARGS(), "sll|l", &name, &name_l...
static ZIPARCHIVE_METHOD(setExternalAttributesName) { struct zip *intern; zval *self = getThis(); size_t name_len; char *name; zend_long flags=0, opsys, attr; zip_int64_t idx; if (!self) { RETURN_FALSE; } ZIP_FROM_OBJECT(intern, self); if (zend_parse_parameters(ZEND_NUM_ARGS(), "sll|l", &name, &name_l...
0
338
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-2351/
NOT_APPLICABLE
bool SyncBackendHost::IsCryptographerReady( const sync_api::BaseTransaction* trans) const { return syncapi_initialized_ && trans->GetCryptographer()->is_ready(); }
bool SyncBackendHost::IsCryptographerReady( const sync_api::BaseTransaction* trans) const { return syncapi_initialized_ && trans->GetCryptographer()->is_ready(); }
0
340
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-5130/
NOT_APPLICABLE
XmlReader::XmlReader() : reader_(NULL) { }
XmlReader::XmlReader() : reader_(NULL) { }
0
341
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-5019/
NOT_APPLICABLE
RenderFrameImpl::~RenderFrameImpl() { for (auto& observer : observers_) observer.RenderFrameGone(); for (auto& observer : observers_) observer.OnDestruct(); base::trace_event::TraceLog::GetInstance()->RemoveProcessLabel(routing_id_); if (auto* factory = AudioOutputIPCFactory::get()) factory->Maybe...
RenderFrameImpl::~RenderFrameImpl() { for (auto& observer : observers_) observer.RenderFrameGone(); for (auto& observer : observers_) observer.OnDestruct(); base::trace_event::TraceLog::GetInstance()->RemoveProcessLabel(routing_id_); if (auto* factory = AudioOutputIPCFactory::get()) factory->Maybe...
0
342
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-15386/
NOT_APPLICABLE
void WaitUntilShown() { while (!is_visible_) { message_loop_runner_ = new MessageLoopRunner; message_loop_runner_->Run(); } }
void WaitUntilShown() { while (!is_visible_) { message_loop_runner_ = new MessageLoopRunner; message_loop_runner_->Run(); } }
0
343
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2014-8324/
NOT_APPLICABLE
static int net_read(struct wif *wi, unsigned char *h80211, int len, struct rx_info *ri) { struct priv_net *pn = wi_priv(wi); uint32_t buf[512]; // 512 * 4 = 2048 unsigned char *bufc = (unsigned char*)buf; int cmd; int sz = sizeof(*ri); int l; int ret; /* try queue */ l = queue_get(pn, buf, sizeof(buf));...
static int net_read(struct wif *wi, unsigned char *h80211, int len, struct rx_info *ri) { struct priv_net *pn = wi_priv(wi); uint32_t buf[512]; // 512 * 4 = 2048 unsigned char *bufc = (unsigned char*)buf; int cmd; int sz = sizeof(*ri); int l; int ret; /* try queue */ l = queue_get(pn, buf, sizeof(buf));...
0
344
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2013-6636/
NOT_APPLICABLE
void AutofillDialogViews::UpdateNotificationArea() { DCHECK(notification_area_); notification_area_->SetNotifications(delegate_->CurrentNotifications()); ContentsPreferredSizeChanged(); }
void AutofillDialogViews::UpdateNotificationArea() { DCHECK(notification_area_); notification_area_->SetNotifications(delegate_->CurrentNotifications()); ContentsPreferredSizeChanged(); }
0
345
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2018-6101/
NOT_APPLICABLE
void ServerWrapper::Close(int connection_id) { server_->Close(connection_id); }
void ServerWrapper::Close(int connection_id) { server_->Close(connection_id); }
0
348
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-9588/
NOT_APPLICABLE
static void prepare_vmcs12(struct kvm_vcpu *vcpu, struct vmcs12 *vmcs12, u32 exit_reason, u32 exit_intr_info, unsigned long exit_qualification) { /* update guest state fields: */ vmcs12->guest_cr0 = vmcs12_guest_cr0(vcpu, vmcs12); vmcs12->guest_cr4 = vmcs12_guest_cr4(vcpu, vmcs12); vmcs12->guest_rsp = ...
static void prepare_vmcs12(struct kvm_vcpu *vcpu, struct vmcs12 *vmcs12, u32 exit_reason, u32 exit_intr_info, unsigned long exit_qualification) { /* update guest state fields: */ vmcs12->guest_cr0 = vmcs12_guest_cr0(vcpu, vmcs12); vmcs12->guest_cr4 = vmcs12_guest_cr4(vcpu, vmcs12); vmcs12->guest_rsp = ...
0
349
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-1683/
NOT_APPLICABLE
templPush(xsltTransformContextPtr ctxt, xsltTemplatePtr value) { if (ctxt->templMax == 0) { ctxt->templMax = 4; ctxt->templTab = (xsltTemplatePtr *) xmlMalloc(ctxt->templMax * sizeof(ctxt->templTab[0])); if (ctxt->templTab == NULL) { ...
templPush(xsltTransformContextPtr ctxt, xsltTemplatePtr value) { if (ctxt->templMax == 0) { ctxt->templMax = 4; ctxt->templTab = (xsltTemplatePtr *) xmlMalloc(ctxt->templMax * sizeof(ctxt->templTab[0])); if (ctxt->templTab == NULL) { ...
0
350
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2019-5755/
NOT_APPLICABLE
SpeechRecognitionManagerImpl::Session::~Session() { }
SpeechRecognitionManagerImpl::Session::~Session() { }
0
351
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-8658/
NOT_APPLICABLE
brcmf_notify_roaming_status(struct brcmf_if *ifp, const struct brcmf_event_msg *e, void *data) { struct brcmf_cfg80211_info *cfg = ifp->drvr->config; u32 event = e->event_code; u32 status = e->status; if (event == BRCMF_E_ROAM && status == BRCMF_E_STATUS_SUCCESS) { if (test_bit(BRCMF_VIF_STATUS_CONNECTED,...
brcmf_notify_roaming_status(struct brcmf_if *ifp, const struct brcmf_event_msg *e, void *data) { struct brcmf_cfg80211_info *cfg = ifp->drvr->config; u32 event = e->event_code; u32 status = e->status; if (event == BRCMF_E_ROAM && status == BRCMF_E_STATUS_SUCCESS) { if (test_bit(BRCMF_VIF_STATUS_CONNECTED,...
0
352
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-16358/
NOT_APPLICABLE
R_API int r_bin_has_dbg_syms(RBin *bin) { RBinObject *o = r_bin_cur_object (bin); return o? (R_BIN_DBG_SYMS & o->info->dbg_info): false; }
R_API int r_bin_has_dbg_syms(RBin *bin) { RBinObject *o = r_bin_cur_object (bin); return o? (R_BIN_DBG_SYMS & o->info->dbg_info): false; }
0
353
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-4565/
NOT_APPLICABLE
static ssize_t ucma_query_gid(struct ucma_context *ctx, void __user *response, int out_len) { struct rdma_ucm_query_addr_resp resp; struct sockaddr_ib *addr; int ret = 0; if (out_len < sizeof(resp)) return -ENOSPC; memset(&resp, 0, sizeof resp); ucma_query_device_addr(ctx->cm_id, &resp); addr = (s...
static ssize_t ucma_query_gid(struct ucma_context *ctx, void __user *response, int out_len) { struct rdma_ucm_query_addr_resp resp; struct sockaddr_ib *addr; int ret = 0; if (out_len < sizeof(resp)) return -ENOSPC; memset(&resp, 0, sizeof resp); ucma_query_device_addr(ctx->cm_id, &resp); addr = (s...
0
354
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2013-2870/
NOT_APPLICABLE
void SocketStream::DoRestartWithAuth() { DCHECK_EQ(next_state_, STATE_AUTH_REQUIRED); tunnel_request_headers_ = NULL; tunnel_request_headers_bytes_sent_ = 0; tunnel_response_headers_ = NULL; tunnel_response_headers_capacity_ = 0; tunnel_response_headers_len_ = 0; next_state_ = STATE_TCP_CONNECT; DoLoop...
void SocketStream::DoRestartWithAuth() { DCHECK_EQ(next_state_, STATE_AUTH_REQUIRED); tunnel_request_headers_ = NULL; tunnel_request_headers_bytes_sent_ = 0; tunnel_response_headers_ = NULL; tunnel_response_headers_capacity_ = 0; tunnel_response_headers_len_ = 0; next_state_ = STATE_TCP_CONNECT; DoLoop...
0
356
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-9059/
NOT_APPLICABLE
nfsd_reap_openowners(struct list_head *reaplist) { struct nfs4_client *clp; struct nfs4_openowner *oop, *next; list_for_each_entry_safe(oop, next, reaplist, oo_perclient) { list_del_init(&oop->oo_perclient); clp = oop->oo_owner.so_client; release_openowner(oop); put_client(clp); } }
nfsd_reap_openowners(struct list_head *reaplist) { struct nfs4_client *clp; struct nfs4_openowner *oop, *next; list_for_each_entry_safe(oop, next, reaplist, oo_perclient) { list_del_init(&oop->oo_perclient); clp = oop->oo_owner.so_client; release_openowner(oop); put_client(clp); } }
0
357
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-5033/
NOT_APPLICABLE
void InputHandlerProxy::ScrollEndForSnapFling() { cc::ScrollState scroll_state = CreateScrollStateForInertialEnd(); input_handler_->ScrollEnd(&scroll_state, false); }
void InputHandlerProxy::ScrollEndForSnapFling() { cc::ScrollState scroll_state = CreateScrollStateForInertialEnd(); input_handler_->ScrollEnd(&scroll_state, false); }
0
358
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2012-1179/
NOT_APPLICABLE
static inline int is_cow_mapping(vm_flags_t flags) { return (flags & (VM_SHARED | VM_MAYWRITE)) == VM_MAYWRITE; }
static inline int is_cow_mapping(vm_flags_t flags) { return (flags & (VM_SHARED | VM_MAYWRITE)) == VM_MAYWRITE; }
0
362
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2009-3605/
NOT_APPLICABLE
SplashCoord Splash::getMiterLimit() { return state->miterLimit; }
SplashCoord Splash::getMiterLimit() { return state->miterLimit; }
0
364
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-2494/
NOT_APPLICABLE
static void fill_stats(struct task_struct *tsk, struct taskstats *stats) { memset(stats, 0, sizeof(*stats)); /* * Each accounting subsystem adds calls to its functions to * fill in relevant parts of struct taskstsats as follows * * per-task-foo(stats, tsk); */ delayacct_add_tsk(stats, tsk); /* fill in b...
static void fill_stats(struct task_struct *tsk, struct taskstats *stats) { memset(stats, 0, sizeof(*stats)); /* * Each accounting subsystem adds calls to its functions to * fill in relevant parts of struct taskstsats as follows * * per-task-foo(stats, tsk); */ delayacct_add_tsk(stats, tsk); /* fill in b...
0
365
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-2839/
NOT_APPLICABLE
static void DoMoreThan2PerMinuteFor5Minutes(const TimeTicks& start_time, QuotaLimitHeuristic* lim, Bucket* b, int an_unexhausted_minute) { for (int i = 0; i < 5; i++) { i...
static void DoMoreThan2PerMinuteFor5Minutes(const TimeTicks& start_time, QuotaLimitHeuristic* lim, Bucket* b, int an_unexhausted_minute) { for (int i = 0; i < 5; i++) { i...
0
366
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-2429/
NOT_APPLICABLE
static FLAC__StreamDecoderInitStatus init_stream_internal_( FLAC__StreamDecoder *decoder, FLAC__StreamDecoderReadCallback read_callback, FLAC__StreamDecoderSeekCallback seek_callback, FLAC__StreamDecoderTellCallback tell_callback, FLAC__StreamDecoderLengthCallback length_callback, FLAC__StreamDecoderEofCallback e...
static FLAC__StreamDecoderInitStatus init_stream_internal_( FLAC__StreamDecoder *decoder, FLAC__StreamDecoderReadCallback read_callback, FLAC__StreamDecoderSeekCallback seek_callback, FLAC__StreamDecoderTellCallback tell_callback, FLAC__StreamDecoderLengthCallback length_callback, FLAC__StreamDecoderEofCallback e...
0
367
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2019-11599/
NOT_APPLICABLE
struct vm_area_struct *_install_special_mapping( struct mm_struct *mm, unsigned long addr, unsigned long len, unsigned long vm_flags, const struct vm_special_mapping *spec) { return __install_special_mapping(mm, addr, len, vm_flags, (void *)spec, &special_mapping_vmops); }
struct vm_area_struct *_install_special_mapping( struct mm_struct *mm, unsigned long addr, unsigned long len, unsigned long vm_flags, const struct vm_special_mapping *spec) { return __install_special_mapping(mm, addr, len, vm_flags, (void *)spec, &special_mapping_vmops); }
0
368
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-2861/
NOT_APPLICABLE
void RenderView::OnThemeChanged() { #if defined(OS_WIN) gfx::NativeThemeWin::instance()->CloseHandles(); if (webview()) webview()->themeChanged(); #else // defined(OS_WIN) NOTIMPLEMENTED(); #endif }
void RenderView::OnThemeChanged() { #if defined(OS_WIN) gfx::NativeThemeWin::instance()->CloseHandles(); if (webview()) webview()->themeChanged(); #else // defined(OS_WIN) NOTIMPLEMENTED(); #endif }
0
369
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-16527/
NOT_APPLICABLE
static int parse_audio_processing_unit(struct mixer_build *state, int unitid, void *raw_desc) { return build_audio_procunit(state, unitid, raw_desc, procunits, "Processing Unit"); }
static int parse_audio_processing_unit(struct mixer_build *state, int unitid, void *raw_desc) { return build_audio_procunit(state, unitid, raw_desc, procunits, "Processing Unit"); }
0
370
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2018-16073/
NOT_APPLICABLE
void SiteInstanceImpl::LockToOriginIfNeeded() { DCHECK(HasSite()); process_->SetIsUsed(); ChildProcessSecurityPolicyImpl* policy = ChildProcessSecurityPolicyImpl::GetInstance(); auto lock_state = policy->CheckOriginLock(process_->GetID(), site_); if (ShouldLockToOrigin(GetBrowserContext(), process_, s...
void SiteInstanceImpl::LockToOriginIfNeeded() { DCHECK(HasSite()); process_->SetIsUsed(); ChildProcessSecurityPolicyImpl* policy = ChildProcessSecurityPolicyImpl::GetInstance(); auto lock_state = policy->CheckOriginLock(process_->GetID(), site_); if (ShouldLockToOrigin(GetBrowserContext(), process_, s...
0
372
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2018-14036/
NOT_APPLICABLE
user_extension_set_property (User *user, Daemon *daemon, GDBusInterfaceInfo *interface, GDBusMethodInvocation *invocation) { const GDBusPropertyInfo *property = g_dbus_method_invocation_get_...
user_extension_set_property (User *user, Daemon *daemon, GDBusInterfaceInfo *interface, GDBusMethodInvocation *invocation) { const GDBusPropertyInfo *property = g_dbus_method_invocation_get_...
0
373
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-2839/
NOT_APPLICABLE
static v8::Handle<v8::Value> StartRequest(const v8::Arguments& args) { std::string str_args = *v8::String::Utf8Value(args[1]); base::JSONReader reader; scoped_ptr<Value> value_args; value_args.reset(reader.JsonToValue(str_args, false, false)); if (!value_args.get() || !value_args->IsType(Value::T...
static v8::Handle<v8::Value> StartRequest(const v8::Arguments& args) { std::string str_args = *v8::String::Utf8Value(args[1]); base::JSONReader reader; scoped_ptr<Value> value_args; value_args.reset(reader.JsonToValue(str_args, false, false)); if (!value_args.get() || !value_args->IsType(Value::T...
0
375
CVE-2016-9557
https://www.cvedetails.com/cve/CVE-2016-9557/
CWE-190
int bmp_validate(jas_stream_t *in) { int n; int i; jas_uchar buf[2]; assert(JAS_STREAM_MAXPUTBACK >= 2); /* Read the first two characters that constitute the signature. */ if ((n = jas_stream_read(in, (char *) buf, 2)) < 0) { return -1; } /* Put the characters read back onto the stream. */ for (i = n...
int bmp_validate(jas_stream_t *in) { int n; int i; uchar buf[2]; assert(JAS_STREAM_MAXPUTBACK >= 2); /* Read the first two characters that constitute the signature. */ if ((n = jas_stream_read(in, (char *) buf, 2)) < 0) { return -1; } /* Put the characters read back onto the stream. */ for (i = n - 1...
1
376
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2012-2894/
NOT_APPLICABLE
void WebUILoginView::Observe(int type, const content::NotificationSource& source, const content::NotificationDetails& details) { switch (type) { case chrome::NOTIFICATION_LOGIN_WEBUI_VISIBLE: { OnLoginPromptVisible(); registrar_.RemoveAll(); ...
void WebUILoginView::Observe(int type, const content::NotificationSource& source, const content::NotificationDetails& details) { switch (type) { case chrome::NOTIFICATION_LOGIN_WEBUI_VISIBLE: { OnLoginPromptVisible(); registrar_.RemoveAll(); ...
0
377
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2016-10192/
NOT_APPLICABLE
static void rtsp_reply_error(HTTPContext *c, enum RTSPStatusCode error_number) { rtsp_reply_header(c, error_number); avio_printf(c->pb, "\r\n"); }
static void rtsp_reply_error(HTTPContext *c, enum RTSPStatusCode error_number) { rtsp_reply_header(c, error_number); avio_printf(c->pb, "\r\n"); }
0
378
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2017-12168/
NOT_APPLICABLE
static bool access_pmovs(struct kvm_vcpu *vcpu, struct sys_reg_params *p, const struct sys_reg_desc *r) { u64 mask = kvm_pmu_valid_counter_mask(vcpu); if (!kvm_arm_pmu_v3_ready(vcpu)) return trap_raz_wi(vcpu, p, r); if (pmu_access_el0_disabled(vcpu)) return false; if (p->is_write) { if (r->CRm & 0x2) ...
static bool access_pmovs(struct kvm_vcpu *vcpu, struct sys_reg_params *p, const struct sys_reg_desc *r) { u64 mask = kvm_pmu_valid_counter_mask(vcpu); if (!kvm_arm_pmu_v3_ready(vcpu)) return trap_raz_wi(vcpu, p, r); if (pmu_access_el0_disabled(vcpu)) return false; if (p->is_write) { if (r->CRm & 0x2) ...
0
379
NOT_APPLICABLE
https://www.cvedetails.com/cve/CVE-2011-3619/
NOT_APPLICABLE
static int param_set_aabool(const char *val, const struct kernel_param *kp) { if (!capable(CAP_MAC_ADMIN)) return -EPERM; return param_set_bool(val, kp); }
static int param_set_aabool(const char *val, const struct kernel_param *kp) { if (!capable(CAP_MAC_ADMIN)) return -EPERM; return param_set_bool(val, kp); }
0
380