idx int64 0 25.4k | project stringclasses 707
values | project_url stringclasses 735
values | filepath stringlengths 4 100 | commit_id stringlengths 7 40 | commit_message stringlengths 0 18.3k ⌀ | is_vulnerable bool 2
classes | hash stringlengths 32 32 | func_name stringlengths 3 112 | func_body stringlengths 23 235k | changed_lines stringlengths 2 27.6k | changed_statements stringlengths 2 161k | cve_list listlengths 1 19 | cwe_list listlengths 1 6 | fixed_func_idx int64 1 25.4k ⌀ | context dict |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
25,400 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| true | 2617f5ebb2cfe06d8598ee4780f11ec3 | SubpelVarianceTest<SubpelVarianceFunctionType>::RefTest | void SubpelVarianceTest<SubpelVarianceFunctionType>::RefTest() {
for (int x = 0; x < 16; ++x) {
for (int y = 0; y < 16; ++y) {
for (int j = 0; j < block_size_; j++) {
src_[j] = rnd.Rand8();
}
for (int j = 0; j < block_size_ + width_ + height_ + 1; j++) {
ref_[j] = rnd.Rand8();
... | [[48, " }"], [137, " src_[j] = rnd.Rand8();"], [138, " ref_[j] = rnd.Rand8();"], [187, " }"], [188, " }"], [191, "}"], [239, " for (int x = 0; x < 16; ++x) {"], [240, " for (int y = 0; y < 16; ++y) {"], [241, " for (int j = 0; j < block_size_; j++) {"], [242, " src_[j] = rnd.Rand8();"],... | [] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,410 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"subpel_variance_",
"subpel_variance_ref"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": [
"block_size_",
"width_",
"height_",
"src_",
"ref_",
"log2width_",
"log2height_... |
25,401 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| true | 7f0d96f6420c414904d3da889d95ef6a | SubpelVarianceTest<vp9_subp_avg_variance_fn_t>::RefTest | void SubpelVarianceTest<vp9_subp_avg_variance_fn_t>::RefTest() {
for (int x = 0; x < 16; ++x) {
for (int y = 0; y < 16; ++y) {
for (int j = 0; j < block_size_; j++) {
src_[j] = rnd.Rand8();
sec_[j] = rnd.Rand8();
}
for (int j = 0; j < block_size_ + width_ + height_ + 1; j++) {
... | [[48, " }"], [137, " src_[j] = rnd.Rand8();"], [138, " ref_[j] = rnd.Rand8();"], [187, " }"], [188, " }"], [191, "}"], [239, " for (int x = 0; x < 16; ++x) {"], [240, " for (int y = 0; y < 16; ++y) {"], [241, " for (int j = 0; j < block_size_; j++) {"], [242, " src_[j] = rnd.Rand8();"],... | [] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,411 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"subpel_variance_",
"subpel_avg_variance_ref"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": [
"block_size_",
"width_",
"height_",
"src_",
"ref_",
"sec_"
]
} |
25,402 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| true | 656ccea24c0764d94dec300f1ca6c847 | SetUp | virtual void SetUp() {
const tuple<int, int, SubpelVarianceFunctionType>& params =
this->GetParam();
log2width_ = get<0>(params);
width_ = 1 << log2width_;
log2height_ = get<1>(params);
height_ = 1 << log2height_;
subpel_variance_ = get<2>(params);
rnd(ACMRandom::Determini... | [[199, " const tuple<int, int, SubpelVarianceFunctionType>& params ="], [200, " this->GetParam();"], [205, " subpel_variance_ = get<2>(params);"], [210, " sec_ = reinterpret_cast<uint8_t *>(vpx_memalign(16, block_size_));"], [211, " ref_ = new uint8_t[block_size_ + width_ + height_ + 1];"], [213, " ... | [[1, "const tuple<int, int, SubpelVarianceFunctionType>& params =\n this->GetParam();"], [7, "subpel_variance_ = get<2>(params);"], [12, "sec_ = reinterpret_cast<uint8_t *>(vpx_memalign(16, block_size_));"], [13, "ref_ = new uint8_t[block_size_ + width_ + height_ + 1];"], [15, "ASSERT_TRUE(sec_ != NULL);"]] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,412 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"vpx_memalign",
"this->GetParam"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": [
"SubpelVarianceFunctionType",
"MseFunctionType"
]
} |
25,403 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| true | 300d6d411da5a2a9186c6d8674658ff1 | TearDown | virtual void TearDown() {
vpx_free(src_);
delete[] ref_;
vpx_free(sec_);
libvpx_test::ClearSystemState();
}
| [[220, " vpx_free(sec_);"]] | [[3, "vpx_free(sec_);"]] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,413 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [],
"Function Argument": [],
"Globals": [
"use_high_bit_depth_"
],
"Type Execution Declaration": []
} |
25,404 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| true | 00f5d0f70e1982c538264adb18a583fb | VarianceTest<VarianceFunctionType>::ZeroTest | void VarianceTest<VarianceFunctionType>::ZeroTest() {
for (int i = 0; i <= 255; ++i) {
memset(src_, i, block_size_);
for (int j = 0; j <= 255; ++j) {
memset(ref_, j, block_size_);
unsigned int sse;
unsigned int var;
REGISTER_STATE_CHECK(var = variance_(src_, width_, ref_, width_, ... | [[122, " memset(src_, i, block_size_);"], [124, " memset(ref_, j, block_size_);"], [127, " REGISTER_STATE_CHECK(var = variance_(src_, width_, ref_, width_, &sse));"], [128, " EXPECT_EQ(0u, var) << \"src values: \" << i << \"ref values: \" << j;"], [158, " REGISTER_STATE_CHECK(var = variance_(src_, wi... | [[2, "memset(src_, i, block_size_);"], [4, "memset(ref_, j, block_size_);"], [7, "REGISTER_STATE_CHECK(var = variance_(src_, width_, ref_, width_, &sse));"], [8, "EXPECT_EQ(0u, var) << \"src values: \" << i << \"ref values: \" << j;"]] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,414 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"variance_"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": []
} |
25,405 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| true | d03d1614b57ba66f8db84d26d6c94b83 | subpel_avg_variance_ref | unsigned int subpel_avg_variance_ref(const uint8_t *ref,
const uint8_t *src,
const uint8_t *second_pred,
int l2w, int l2h,
int xoff, int yoff,
... | [[40, " int se = 0;"], [41, " unsigned int sse = 0;"], [42, " const int w = 1 << l2w, h = 1 << l2h;"], [43, " for (int y = 0; y < h; y++) {"], [44, " for (int x = 0; x < w; x++) {"], [46, " se += diff;"], [47, " sse += diff * diff;"], [48, " }"], [50, " *sse_ptr = sse;"], [51, " return sse - (((in... | [] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | null | {
"Execution Environment": [],
"Explanation": null,
"External Function": [],
"Function Argument": [
"ref",
"src",
"second_pred",
"l2w",
"l2h"
],
"Globals": [],
"Type Execution Declaration": []
} |
25,406 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| true | faa408873c0998dfd45d3963cc09fd44 | subpel_variance_ref | static unsigned int subpel_variance_ref(const uint8_t *ref, const uint8_t *src,
int l2w, int l2h, int xoff, int yoff,
unsigned int *sse_ptr) {
int se = 0;
unsigned int sse = 0;
const int w = 1 << l2w, h = 1 << l2h;
for (int y = 0; ... | [[40, " int se = 0;"], [41, " unsigned int sse = 0;"], [42, " const int w = 1 << l2w, h = 1 << l2h;"], [46, " se += diff;"], [47, " sse += diff * diff;"], [50, " *sse_ptr = sse;"], [51, " return sse - (((int64_t) se * se) >> (l2w + l2h));"], [55, " int l2w, int l2h,... | [] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,415 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [],
"Function Argument": [
"ref",
"src",
"l2w",
"l2h"
],
"Globals": [],
"Type Execution Declaration": []
} |
25,407 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| true | 53349cace652e3f91fe35a64b4b2062e | variance_ref | static unsigned int variance_ref(const uint8_t *ref, const uint8_t *src,
int l2w, int l2h, unsigned int *sse_ptr) {
int se = 0;
unsigned int sse = 0;
const int w = 1 << l2w, h = 1 << l2h;
for (int y = 0; y < h; y++) {
for (int x = 0; x < w; x++) {
int diff = ref[w * y ... | [[39, " int l2w, int l2h, unsigned int *sse_ptr) {"], [40, " int se = 0;"], [41, " unsigned int sse = 0;"], [42, " const int w = 1 << l2w, h = 1 << l2h;"], [43, " for (int y = 0; y < h; y++) {"], [44, " for (int x = 0; x < w; x++) {"], [45, " int diff = ref[w * y + x] - src[w... | [] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,416 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [],
"Function Argument": [
"ref",
"src"
],
"Globals": [],
"Type Execution Declaration": []
} |
25,408 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| false | 51f70436904fb74cab9bf7de6e288081 | VarianceTest<VarianceFunctionType>::OneQuarterTest | void VarianceTest<VarianceFunctionType>::OneQuarterTest() {
const int half = block_size_ / 2;
if (!use_high_bit_depth_) {
memset(src_, 255, block_size_);
memset(ref_, 255, half);
memset(ref_ + half, 0, half);
#if CONFIG_VP9_HIGHBITDEPTH
} else {
vpx_memset16(CONVERT_TO_SHORTPTR(src_), 255 << (bi... | [[73, " }"], [75, "}"], [89, " if (!use_high_bit_depth_) {"], [94, "#if CONFIG_VP9_HIGHBITDEPTH"], [95, " } else {"], [100, "#endif // CONFIG_VP9_HIGHBITDEPTH"], [101, " }"], [109, "}"], [133, " if (!use_high_bit_depth_) {"], [144, "#if CONFIG_VP9_HIGHBITDEPTH"], [145, " } else {"], [158, "#e... | [] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,408 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"variance_"
],
"Function Argument": [],
"Globals": [
"block_size_",
"width_",
"use_high_bit_depth_",
"bit_depth_"
],
"Type Execution Declaration": [
"src_",
"ref_"
]
} |
25,409 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| false | aa7af9515e973d9baba8ba3658f35316 | VarianceTest<VarianceFunctionType>::RefTest | void VarianceTest<VarianceFunctionType>::RefTest() {
for (int i = 0; i < 10; ++i) {
for (int j = 0; j < block_size_; j++) {
if (!use_high_bit_depth_) {
src_[j] = rnd_.Rand8();
ref_[j] = rnd_.Rand8();
#if CONFIG_VP9_HIGHBITDEPTH
} else {
CONVERT_TO_SHORTPTR(src_)[j] = rnd_.Rand16() && ... | [[73, " }"], [75, "}"], [89, " if (!use_high_bit_depth_) {"], [94, "#if CONFIG_VP9_HIGHBITDEPTH"], [95, " } else {"], [100, "#endif // CONFIG_VP9_HIGHBITDEPTH"], [101, " }"], [109, "}"], [133, " if (!use_high_bit_depth_) {"], [144, "#if CONFIG_VP9_HIGHBITDEPTH"], [145, " } else {"], [158, "#e... | [] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,409 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"variance_",
"variance_ref"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": [
"block_size_",
"src_",
"ref_",
"width_",
"log2width_",
"log2height_"
]
} |
25,410 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| false | fd39d7a0fba2f868c85dee5e33ca2d16 | SubpelVarianceTest<SubpelVarianceFunctionType>::RefTest | void SubpelVarianceTest<SubpelVarianceFunctionType>::RefTest() {
for (int x = 0; x < 8; ++x) {
for (int y = 0; y < 8; ++y) {
if (!use_high_bit_depth_) {
for (int j = 0; j < block_size_; j++) {
src_[j] = rnd_.Rand8();
}
for (int j = 0; j < block_size_ + width_ + height_ + 1... | [[73, " }"], [75, "}"], [89, " if (!use_high_bit_depth_) {"], [94, "#if CONFIG_VP9_HIGHBITDEPTH"], [95, " } else {"], [100, "#endif // CONFIG_VP9_HIGHBITDEPTH"], [101, " }"], [109, "}"], [133, " if (!use_high_bit_depth_) {"], [144, "#if CONFIG_VP9_HIGHBITDEPTH"], [145, " } else {"], [158, "#e... | [] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,410 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"subpel_variance_",
"subpel_variance_ref"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": [
"block_size_",
"width_",
"height_",
"src_",
"ref_",
"log2width_",
"log2height_... |
25,411 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| false | acfe79013b6479ac7b948d4b10e4715f | SubpelVarianceTest<vp9_subp_avg_variance_fn_t>::RefTest | void SubpelVarianceTest<vp9_subp_avg_variance_fn_t>::RefTest() {
void SubpelVarianceTest<SubpixAvgVarMxNFunc>::RefTest() {
for (int x = 0; x < 8; ++x) {
for (int y = 0; y < 8; ++y) {
if (!use_high_bit_depth_) {
for (int j = 0; j < block_size_; j++) {
src_[j] = rnd_.Rand8();
sec_[... | [[73, " }"], [75, "}"], [89, " if (!use_high_bit_depth_) {"], [94, "#if CONFIG_VP9_HIGHBITDEPTH"], [95, " } else {"], [100, "#endif // CONFIG_VP9_HIGHBITDEPTH"], [101, " }"], [109, "}"], [133, " if (!use_high_bit_depth_) {"], [144, "#if CONFIG_VP9_HIGHBITDEPTH"], [145, " } else {"], [158, "#e... | [] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,411 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"subpel_variance_",
"subpel_avg_variance_ref"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": [
"block_size_",
"width_",
"height_",
"src_",
"ref_",
"sec_"
]
} |
25,412 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| false | bfecfbb5c3a2d5ffdc900c9964aa540e | SetUp | virtual void SetUp() {
const tuple<int, int, MseFunctionType>& params = this->GetParam();
log2width_ = get<0>(params);
width_ = 1 << log2width_;
log2height_ = get<1>(params);
height_ = 1 << log2height_;
mse_ = get<2>(params);
rnd(ACMRandom::DeterministicSeed());
block_size_ =... | [[396, " const tuple<int, int, MseFunctionType>& params = this->GetParam();"], [401, " mse_ = get<2>(params);"], [406, " ref_ = new uint8_t[block_size_];"], [548, " this->GetParam();"]] | [] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,412 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"vpx_memalign",
"this->GetParam"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": [
"SubpelVarianceFunctionType",
"MseFunctionType"
]
} |
25,413 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| false | afccbb1a8f7ff9907af1a76a91b7a581 | TearDown | virtual void TearDown() {
vpx_free(src_);
delete[] ref_;
libvpx_test::ClearSystemState();
}
protected:
void RefTest_mse();
void RefTest_sse();
void MaxTest_mse();
void MaxTest_sse();
ACMRandom rnd;
uint8_t* src_;
uint8_t* ref_;
int width_, log2width_;
int height_, log2height_;
... | [[73, " }"], [75, "}"], [81, " vpx_bit_depth_t bit_depth) {"], [82, " int64_t se = 0;"], [83, " uint64_t sse = 0;"], [84, " const int w = 1 << l2w;"], [85, " const int h = 1 << l2h;"], [89, " if (!use_high_bit_depth_) {"], [92, " se += diff;"], [93, " sse += diff * di... | [] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,413 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [],
"Function Argument": [],
"Globals": [
"use_high_bit_depth_"
],
"Type Execution Declaration": []
} |
25,414 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| false | 12e9b6a7d1b35f3a32ee3391d6599586 | VarianceTest<VarianceFunctionType>::ZeroTest | void VarianceTest<VarianceFunctionType>::ZeroTest() {
for (int i = 0; i <= 255; ++i) {
if (!use_high_bit_depth_) {
memset(src_, i, block_size_);
#if CONFIG_VP9_HIGHBITDEPTH
} else {
vpx_memset16(CONVERT_TO_SHORTPTR(src_), i << (bit_depth_ - 8),
block_size_);
#endif // CONFIG_... | [[73, " }"], [75, "}"], [89, " if (!use_high_bit_depth_) {"], [94, "#if CONFIG_VP9_HIGHBITDEPTH"], [95, " } else {"], [100, "#endif // CONFIG_VP9_HIGHBITDEPTH"], [101, " }"], [109, "}"], [133, " if (!use_high_bit_depth_) {"], [144, "#if CONFIG_VP9_HIGHBITDEPTH"], [145, " } else {"], [158, "#e... | [] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,414 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"variance_"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": []
} |
25,415 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| false | 6e799ebc1e60dd6568d314d559da7ac8 | subpel_variance_ref | static unsigned int subpel_variance_ref(const uint8_t *ref, const uint8_t *src,
static unsigned int mb_ss_ref(const int16_t *src) {
unsigned int res = 0;
for (int i = 0; i < 256; ++i) {
res += src[i] * src[i];
}
return res;
}
static uint32_t variance_ref(const uint8_t *src, const uint8_t *ref,
... | [[69, "static unsigned int mb_ss_ref(const int16_t *src) {"], [70, " unsigned int res = 0;"], [71, " for (int i = 0; i < 256; ++i) {"], [72, " res += src[i] * src[i];"], [73, " }"], [74, " return res;"], [75, "}"], [77, "static uint32_t variance_ref(const uint8_t *src, const uint8_t *ref,"], [78, " ... | [] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,415 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [],
"Function Argument": [
"ref",
"src",
"l2w",
"l2h"
],
"Globals": [],
"Type Execution Declaration": []
} |
25,416 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/variance_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| false | bce65efa2b8af39b2c1168bcef1c8129 | variance_ref | static unsigned int variance_ref(const uint8_t *ref, const uint8_t *src,
//// Truncate high bit depth results by downshifting (with rounding) by:
//// 2 * (bit_depth - 8) for sse
//// (bit_depth - 8) for se
static void RoundHighBitDepth(int bit_depth, int64_t *se, uint64_t *sse) {
switch (bit_depth) {
case VPX_BI... | [[53, "static void RoundHighBitDepth(int bit_depth, int64_t *se, uint64_t *sse) {"], [54, " switch (bit_depth) {"], [55, " case VPX_BITS_12:"], [56, " *sse = (*sse + 128) >> 8;"], [57, " *se = (*se + 8) >> 4;"], [58, " break;"], [59, " case VPX_BITS_10:"], [60, " *sse = (*sse + 8) >> 4;"], [6... | [[0, "static unsigned int variance_ref(const uint8_t *ref, const uint8_t *src,\n//// Truncate high bit depth results by downshifting (with rounding) by:\n//// 2 * (bit_depth - 8) for sse\n//// (bit_depth - 8) for se\nstatic void RoundHighBitDepth(int bit_depth, int64_t *se, uint64_t *sse) {"], [5, "switch (bit_depth) {... | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,416 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [],
"Function Argument": [
"ref",
"src"
],
"Globals": [],
"Type Execution Declaration": []
} |
25,417 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/vp9_lossless_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| false | 5b0d1874b2cdd9f03e41d6d62095c9fc | LosslessTestLarge | LosslessTestLarge()
LosslessTest()
: EncoderTest(GET_PARAM(0)),
psnr_(kMaxPsnr),
nframes_(0),
encoding_mode_(GET_PARAM(1)) {
}
| [[27, " LosslessTest()"]] | [[1, "LosslessTest()\n : EncoderTest(GET_PARAM(0)),\n psnr_(kMaxPsnr),\n nframes_(0),\n encoding_mode_(GET_PARAM(1))"]] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | null | {
"Execution Environment": null,
"Explanation": null,
"External Function": null,
"Function Argument": null,
"Globals": null,
"Type Execution Declaration": null
} |
25,418 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/vp9_thread_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| true | fdb274e1e7feccb4d3e2688feda6ee81 | DecodeFile | string DecodeFile(const string& filename, int num_threads) {
libvpx_test::WebMVideoSource video(filename);
video.Init();
vpx_codec_dec_cfg_t cfg = {0};
cfg.threads = num_threads;
libvpx_test::VP9Decoder decoder(cfg, 0);
libvpx_test::MD5 md5;
for (video.Begin(); video.cxdata(); video.Next()) {
con... | [[61, " }"], [84, " }"], [105, " vpx_codec_dec_cfg_t cfg = {0};"], [152, " }"], [153, " }"], [212, " }"], [213, " }"]] | [] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,421 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"libvpx_test::WebMVideoSource",
"libvpx_test::VP9Decoder",
"libvpx_test::MD5",
"decoder.DecodeFrame",
"decoder.GetDxData",
"dec_iter.Next",
"md5.Get"
],
"Function Argument": [
"filename",
"num_thread... |
25,419 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/vp9_thread_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| true | e0913b9251a51aabdbd412b06141e06c | SetUp | virtual void SetUp() {
vp9_worker_init(&worker_);
}
| [[28, " vp9_worker_init(&worker_);"]] | [[1, "vp9_worker_init(&worker_);"]] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,422 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"vp9_worker_init",
"vpx_get_worker_interface"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": []
} |
25,420 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/vp9_thread_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| true | 3e51cb378644935819503abed66a45d6 | TearDown | virtual void TearDown() {
vp9_worker_end(&worker_);
}
| [[32, " vp9_worker_end(&worker_);"]] | [[1, "vp9_worker_end(&worker_);"]] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,423 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"vp9_worker_end",
"vpx_get_worker_interface"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": [
"worker_"
]
} |
25,421 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/vp9_thread_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| false | 0543570fb582de7596892c5a2397105a | DecodeFile | string DecodeFile(const string& filename, int num_threads) {
libvpx_test::WebMVideoSource video(filename);
video.Init();
vpx_codec_dec_cfg_t cfg = vpx_codec_dec_cfg_t();
cfg.threads = num_threads;
libvpx_test::VP9Decoder decoder(cfg, 0);
libvpx_test::MD5 md5;
for (video.Begin(); video.cxdata(); vi... | [[166, " vpx_codec_dec_cfg_t cfg = vpx_codec_dec_cfg_t();"]] | [[4, "vpx_codec_dec_cfg_t cfg = vpx_codec_dec_cfg_t();"]] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,421 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"libvpx_test::WebMVideoSource",
"libvpx_test::VP9Decoder",
"libvpx_test::MD5",
"decoder.DecodeFrame",
"decoder.GetDxData",
"dec_iter.Next",
"md5.Get"
],
"Function Argument": [
"filename",
"num_thread... |
25,422 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/vp9_thread_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| false | 41e0dcc79a86223bbd626e825f1bb82b | SetUp | virtual void SetUp() {
vpx_get_worker_interface()->init(&worker_);
}
| [[31, " vpx_get_worker_interface()->init(&worker_);"]] | [[1, "vpx_get_worker_interface()->init(&worker_);"]] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,422 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"vp9_worker_init",
"vpx_get_worker_interface"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": []
} |
25,423 | Android | https://android.googlesource.com/platform/external/libvpx | libvpx/test/vp9_thread_test.cc | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
| false | 961e31caf869c06e65796eb30694b510 | TearDown | virtual void TearDown() {
vpx_get_worker_interface()->end(&worker_);
}
| [[35, " vpx_get_worker_interface()->end(&worker_);"]] | [[1, "vpx_get_worker_interface()->end(&worker_);"]] | [
"CVE-2016-1621"
] | [
"CWE-119"
] | 25,423 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"vp9_worker_end",
"vpx_get_worker_interface"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": [
"worker_"
]
} |
25,424 | Android | https://android.googlesource.com/platform/external/sonivox | arm-wt-22k/lib_src/eas_wtengine.c | 24d7c408c52143bce7b49de82f3913fd8d1219cf | Sonivox: add SafetyNet log.
Bug: 26366256
Change-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0
| false | cb9118619bf6621d648b3968a892eb1a | WT_Interpolate | void WT_Interpolate (S_WT_VOICE *pWTVoice, S_WT_INT_FRAME *pWTIntFrame)
{
EAS_PCM *pOutputBuffer;
EAS_I32 phaseInc;
EAS_I32 phaseFrac;
EAS_I32 acc0;
const EAS_SAMPLE *pSamples;
const EAS_SAMPLE *loopEnd;
EAS_I32 samp1;
EAS_I32 samp2;
EAS_I32 numSamples;
/* initialize some local variables... | [[96, " android_errorWriteLog(0x534e4554, \"26366256\");"], [195, " android_errorWriteLog(0x534e4554, \"26366256\");"], [293, " android_errorWriteLog(0x534e4554, \"26366256\");"], [386, " android_errorWriteLog(0x534e4554, \"26366256\");"], [454, " android_errorWriteLog(0x534e4554, \"2... | [[17, "android_errorWriteLog(0x534e4554, \"26366256\");"]] | [
"CVE-2016-0838"
] | [
"CWE-119"
] | null | {
"Execution Environment": null,
"Explanation": null,
"External Function": null,
"Function Argument": null,
"Globals": null,
"Type Execution Declaration": null
} |
25,425 | Android | https://android.googlesource.com/platform/external/sonivox | arm-wt-22k/lib_src/eas_wtengine.c | 24d7c408c52143bce7b49de82f3913fd8d1219cf | Sonivox: add SafetyNet log.
Bug: 26366256
Change-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0
| false | 94f1230178313f35119d0bda43ab5531 | WT_InterpolateMono | void WT_InterpolateMono (S_WT_VOICE *pWTVoice, S_WT_INT_FRAME *pWTIntFrame)
{
EAS_I32 *pMixBuffer;
const EAS_I8 *pLoopEnd;
const EAS_I8 *pCurrentPhaseInt;
EAS_I32 numSamples;
EAS_I32 gain;
EAS_I32 gainIncrement;
EAS_I32 currentPhaseFrac;
EAS_I32 phaseInc;
EAS_I32 tmp0;
EAS_I32 tmp1;
... | [[96, " android_errorWriteLog(0x534e4554, \"26366256\");"], [195, " android_errorWriteLog(0x534e4554, \"26366256\");"], [293, " android_errorWriteLog(0x534e4554, \"26366256\");"], [386, " android_errorWriteLog(0x534e4554, \"26366256\");"], [454, " android_errorWriteLog(0x534e4554, \"2... | [[19, "android_errorWriteLog(0x534e4554, \"26366256\");"]] | [
"CVE-2016-0838"
] | [
"CWE-119"
] | null | {
"Execution Environment": null,
"Explanation": null,
"External Function": null,
"Function Argument": null,
"Globals": null,
"Type Execution Declaration": null
} |
25,426 | Android | https://android.googlesource.com/platform/external/sonivox | arm-wt-22k/lib_src/eas_wtengine.c | 24d7c408c52143bce7b49de82f3913fd8d1219cf | Sonivox: add SafetyNet log.
Bug: 26366256
Change-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0
| false | b86ab9a6e87b46203c4674a298754b15 | WT_InterpolateNoLoop | void WT_InterpolateNoLoop (S_WT_VOICE *pWTVoice, S_WT_INT_FRAME *pWTIntFrame)
{
EAS_PCM *pOutputBuffer;
EAS_I32 phaseInc;
EAS_I32 phaseFrac;
EAS_I32 acc0;
const EAS_SAMPLE *pSamples;
EAS_I32 samp1;
EAS_I32 samp2;
EAS_I32 numSamples;
/* initialize some local variables */
numSamples =... | [[96, " android_errorWriteLog(0x534e4554, \"26366256\");"], [195, " android_errorWriteLog(0x534e4554, \"26366256\");"], [293, " android_errorWriteLog(0x534e4554, \"26366256\");"], [386, " android_errorWriteLog(0x534e4554, \"26366256\");"], [454, " android_errorWriteLog(0x534e4554, \"2... | [[16, "android_errorWriteLog(0x534e4554, \"26366256\");"]] | [
"CVE-2016-0838"
] | [
"CWE-119"
] | null | {
"Execution Environment": null,
"Explanation": null,
"External Function": null,
"Function Argument": null,
"Globals": null,
"Type Execution Declaration": null
} |
25,427 | Android | https://android.googlesource.com/platform/external/sonivox | arm-wt-22k/lib_src/eas_wtengine.c | 24d7c408c52143bce7b49de82f3913fd8d1219cf | Sonivox: add SafetyNet log.
Bug: 26366256
Change-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0
| false | 6e391d560bab6570c0d171ac619eb9b7 | WT_NoiseGenerator | void WT_NoiseGenerator (S_WT_VOICE *pWTVoice, S_WT_INT_FRAME *pWTIntFrame)
{
EAS_PCM *pOutputBuffer;
EAS_I32 phaseInc;
EAS_I32 tmp0;
EAS_I32 tmp1;
EAS_I32 nInterpolatedSample;
EAS_I32 numSamples;
/* initialize some local variables */
numSamples = pWTIntFrame->numSamples;
if (numSa... | [[96, " android_errorWriteLog(0x534e4554, \"26366256\");"], [195, " android_errorWriteLog(0x534e4554, \"26366256\");"], [293, " android_errorWriteLog(0x534e4554, \"26366256\");"], [386, " android_errorWriteLog(0x534e4554, \"26366256\");"], [454, " android_errorWriteLog(0x534e4554, \"2... | [[14, "android_errorWriteLog(0x534e4554, \"26366256\");"]] | [
"CVE-2016-0838"
] | [
"CWE-119"
] | null | {
"Execution Environment": null,
"Explanation": null,
"External Function": null,
"Function Argument": null,
"Globals": null,
"Type Execution Declaration": null
} |
25,428 | Android | https://android.googlesource.com/platform/external/sonivox | arm-wt-22k/lib_src/eas_wtengine.c | 24d7c408c52143bce7b49de82f3913fd8d1219cf | Sonivox: add SafetyNet log.
Bug: 26366256
Change-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0
| false | 47e01403cbf7e9de6862d5444fafea00 | WT_VoiceFilter | void WT_VoiceFilter (S_FILTER_CONTROL *pFilter, S_WT_INT_FRAME *pWTIntFrame)
{
EAS_PCM *pAudioBuffer;
EAS_I32 k;
EAS_I32 b1;
EAS_I32 b2;
EAS_I32 z1;
EAS_I32 z2;
EAS_I32 acc0;
EAS_I32 acc1;
EAS_I32 numSamples;
/* initialize some local variables */
numSamples = pWTIntFrame->num... | [[96, " android_errorWriteLog(0x534e4554, \"26366256\");"], [195, " android_errorWriteLog(0x534e4554, \"26366256\");"], [293, " android_errorWriteLog(0x534e4554, \"26366256\");"], [386, " android_errorWriteLog(0x534e4554, \"26366256\");"], [454, " android_errorWriteLog(0x534e4554, \"2... | [[17, "android_errorWriteLog(0x534e4554, \"26366256\");"]] | [
"CVE-2016-0838"
] | [
"CWE-119"
] | null | {
"Execution Environment": null,
"Explanation": null,
"External Function": null,
"Function Argument": null,
"Globals": null,
"Type Execution Declaration": null
} |
25,429 | Android | https://android.googlesource.com/platform/external/sonivox | arm-wt-22k/lib_src/eas_wtengine.c | 24d7c408c52143bce7b49de82f3913fd8d1219cf | Sonivox: add SafetyNet log.
Bug: 26366256
Change-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0
| false | 1e1cb026fcaef4c2d606828fc96e19b5 | WT_VoiceGain | void WT_VoiceGain (S_WT_VOICE *pWTVoice, S_WT_INT_FRAME *pWTIntFrame)
{
EAS_I32 *pMixBuffer;
EAS_PCM *pInputBuffer;
EAS_I32 gain;
EAS_I32 gainIncrement;
EAS_I32 tmp0;
EAS_I32 tmp1;
EAS_I32 tmp2;
EAS_I32 numSamples;
#if (NUM_OUTPUT_CHANNELS == 2)
EAS_I32 gainLeft, gainRight;
#endif
... | [[96, " android_errorWriteLog(0x534e4554, \"26366256\");"], [195, " android_errorWriteLog(0x534e4554, \"26366256\");"], [293, " android_errorWriteLog(0x534e4554, \"26366256\");"], [386, " android_errorWriteLog(0x534e4554, \"26366256\");"], [454, " android_errorWriteLog(0x534e4554, \"2... | [[20, "android_errorWriteLog(0x534e4554, \"26366256\");"]] | [
"CVE-2016-0838"
] | [
"CWE-119"
] | null | {
"Execution Environment": null,
"Explanation": null,
"External Function": null,
"Function Argument": null,
"Globals": null,
"Type Execution Declaration": null
} |
25,430 | Android | https://android.googlesource.com/platform/external/sonivox | arm-wt-22k/lib_src/eas_wtsynth.c | 24d7c408c52143bce7b49de82f3913fd8d1219cf | Sonivox: add SafetyNet log.
Bug: 26366256
Change-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0
| false | 504c87438e1966350f627c71e925793f | WT_CheckSampleEnd | EAS_BOOL WT_CheckSampleEnd (S_WT_VOICE *pWTVoice, S_WT_INT_FRAME *pWTIntFrame, EAS_BOOL update)
{
EAS_U32 endPhaseAccum;
EAS_U32 endPhaseFrac;
EAS_I32 numSamples;
EAS_BOOL done = EAS_FALSE;
/* check to see if we hit the end of the waveform this time */
/*lint -e{703} use shift for performance */
... | [[475, " android_errorWriteLog(0x534e4554, \"26366256\");"]] | [[27, "android_errorWriteLog(0x534e4554, \"26366256\");"]] | [
"CVE-2016-0838"
] | [
"CWE-119"
] | null | {
"Execution Environment": null,
"Explanation": null,
"External Function": null,
"Function Argument": null,
"Globals": null,
"Type Execution Declaration": null
} |
25,431 | Android | https://android.googlesource.com/platform/external/libmpeg2 | decoder/impeg2d_pnb_pic.c | 58a6822d7140137ce957c6d2fc20bae1374186c1 | Return error for wrong mb_type
If mb_type decoded returns an invalid type of MB, then return error
Bug: 26070014
Change-Id: I66abcad5de1352dd42d05b1a13bb4176153b133c
| true | de3c6d2a44ea066f8ec8834c9123e9d3 | impeg2d_dec_p_b_slice | IMPEG2D_ERROR_CODES_T impeg2d_dec_p_b_slice(dec_state_t *ps_dec)
{
WORD16 *pi2_vld_out;
UWORD32 i;
yuv_buf_t *ps_cur_frm_buf = &ps_dec->s_cur_frm_buf;
UWORD32 u4_frm_offset = 0;
const dec_mb_params_t *ps_dec_mb_params;
IMPEG2D_ERROR_CODES_T e_error = (IMPEG2D_ERROR_CODES_T)IVD_ERROR_N... | [[485, " impeg2d_dec_pnb_mb_params(ps_dec);"], [487, " impeg2d_dec_p_mb_params(ps_dec);"]] | [[44, "impeg2d_dec_pnb_mb_params(ps_dec);"], [46, "impeg2d_dec_p_mb_params(ps_dec);"]] | [
"CVE-2016-0835"
] | [
"CWE-119"
] | 25,432 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"impeg2d_dec_pnb_mb_params",
"impeg2d_dec_p_mb_params"
],
"Function Argument": [
"ps_dec"
],
"Globals": [],
"Type Execution Declaration": [
"dec_state_t"
]
} |
25,432 | Android | https://android.googlesource.com/platform/external/libmpeg2 | decoder/impeg2d_pnb_pic.c | 58a6822d7140137ce957c6d2fc20bae1374186c1 | Return error for wrong mb_type
If mb_type decoded returns an invalid type of MB, then return error
Bug: 26070014
Change-Id: I66abcad5de1352dd42d05b1a13bb4176153b133c
| false | 1ee02e9c9093b00a6602ac1cf509a6d1 | impeg2d_dec_p_b_slice | IMPEG2D_ERROR_CODES_T impeg2d_dec_p_b_slice(dec_state_t *ps_dec)
{
WORD16 *pi2_vld_out;
UWORD32 i;
yuv_buf_t *ps_cur_frm_buf = &ps_dec->s_cur_frm_buf;
UWORD32 u4_frm_offset = 0;
const dec_mb_params_t *ps_dec_mb_params;
IMPEG2D_ERROR_CODES_T e_error = (IMPEG2D_ERROR_CODES_T)IVD_ERROR_N... | [[480, " WORD32 ret;"], [493, " ret = impeg2d_dec_pnb_mb_params(ps_dec);"], [495, " ret = impeg2d_dec_p_mb_params(ps_dec);"], [497, " if(ret)"], [498, " return IMPEG2D_MB_TEX_DECODE_ERR;"]] | [[31, "WORD32 ret;"], [45, "ret = impeg2d_dec_pnb_mb_params(ps_dec);"], [47, "ret = impeg2d_dec_p_mb_params(ps_dec);"], [49, "if(ret)"], [50, "return IMPEG2D_MB_TEX_DECODE_ERR;"]] | [
"CVE-2016-0835"
] | [
"CWE-119"
] | 25,432 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"impeg2d_dec_pnb_mb_params",
"impeg2d_dec_p_mb_params"
],
"Function Argument": [
"ps_dec"
],
"Globals": [],
"Type Execution Declaration": [
"dec_state_t"
]
} |
25,433 | Android | https://android.googlesource.com/platform/external/libmpeg2 | decoder/impeg2d_pnb_pic.c | 58a6822d7140137ce957c6d2fc20bae1374186c1 | Return error for wrong mb_type
If mb_type decoded returns an invalid type of MB, then return error
Bug: 26070014
Change-Id: I66abcad5de1352dd42d05b1a13bb4176153b133c
| false | 2b47da91afa3915ab75d5bc89ff7a8d6 | impeg2d_dec_p_mb_params | void impeg2d_dec_p_mb_params(dec_state_t *ps_dec)
WORD32 impeg2d_dec_p_mb_params(dec_state_t *ps_dec)
{
stream_t *ps_stream = &ps_dec->s_bit_stream;
UWORD16 u2_mb_addr_incr;
UWORD16 u2_total_len;
UWORD16 u2_len;
UWORD16 u2_mb_type;
UWORD32 u4_next_word;
const dec_mb_params_t *ps_dec_mb_para... | [[63, "WORD32 impeg2d_dec_p_mb_params(dec_state_t *ps_dec)"], [183, " if(NULL == ps_dec_mb_params->pf_func_mb_params)"], [184, " return -1;"], [228, " return 0;"], [379, " if(NULL == ps_dec_mb_params->pf_func_mb_params)"], [380, " return -1;"], [392, " if(NULL == ps_dec_mb... | [[0, "void impeg2d_dec_p_mb_params(dec_state_t *ps_dec)\nWORD32 impeg2d_dec_p_mb_params(dec_state_t *ps_dec)"], [121, "if(NULL == ps_dec_mb_params->pf_func_mb_params)"], [122, "return -1;"]] | [
"CVE-2016-0835"
] | [
"CWE-119"
] | null | {
"Execution Environment": null,
"Explanation": null,
"External Function": null,
"Function Argument": null,
"Globals": null,
"Type Execution Declaration": null
} |
25,434 | Android | https://android.googlesource.com/platform/external/libmpeg2 | decoder/impeg2d_pnb_pic.c | 58a6822d7140137ce957c6d2fc20bae1374186c1 | Return error for wrong mb_type
If mb_type decoded returns an invalid type of MB, then return error
Bug: 26070014
Change-Id: I66abcad5de1352dd42d05b1a13bb4176153b133c
| false | d48798728d9d74d3f0d13221dd2a805d | impeg2d_dec_pnb_mb_params | void impeg2d_dec_pnb_mb_params(dec_state_t *ps_dec)
WORD32 impeg2d_dec_pnb_mb_params(dec_state_t *ps_dec)
{
stream_t *ps_stream = &ps_dec->s_bit_stream;
UWORD16 u2_mb_addr_incr;
UWORD16 u2_total_len;
UWORD16 u2_len;
UWORD16 u2_mb_type;
UWORD32 u4_next_word;
const dec_mb_params_t *ps_dec_mb_p... | [[183, " if(NULL == ps_dec_mb_params->pf_func_mb_params)"], [184, " return -1;"], [228, " return 0;"], [243, "WORD32 impeg2d_dec_pnb_mb_params(dec_state_t *ps_dec)"], [379, " if(NULL == ps_dec_mb_params->pf_func_mb_params)"], [380, " return -1;"], [392, " if(NULL == ps_dec_... | [] | [
"CVE-2016-0835"
] | [
"CWE-119"
] | null | {
"Execution Environment": null,
"Explanation": null,
"External Function": null,
"Function Argument": null,
"Globals": null,
"Type Execution Declaration": null
} |
25,435 | Android | https://android.googlesource.com/platform/hardware/qcom/audio | post_proc/equalizer.c | d72ea85c78a1a68bf99fd5804ad9784b4102fe57 | Fix security vulnerability: Equalizer command might allow negative indexes
Bug: 32247948
Bug: 32438598
Bug: 32436341
Test: use POC on bug or cts security test
Change-Id: I56a92582687599b5b313dea1abcb8bcb19c7fc0e
(cherry picked from commit 3f37d4ef89f4f0eef9e201c5a91b7b2c77ed1071)
(cherry picked from commit ceb7b2d7a... | true | f5dd8785e48577d9891482280421b70f | equalizer_get_parameter | int equalizer_get_parameter(effect_context_t *context, effect_param_t *p,
uint32_t *size)
{
equalizer_context_t *eq_ctxt = (equalizer_context_t *)context;
int voffset = ((p->psize - 1) / sizeof(int32_t) + 1) * sizeof(int32_t);
int32_t *param_tmp = (int32_t *)p->data;
int32_t param = *param_tmp++;
int32_t param2;
... | [[268, " if (param2 >= NUM_EQ_BANDS) {"], [278, " if (param2 >= NUM_EQ_BANDS) {"], [279, " p->status = -EINVAL;"], [288, " if (param2 >= NUM_EQ_BANDS) {"]] | [] | [
"CVE-2017-0402"
] | [
"CWE-200"
] | 25,436 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"equalizer_get_band_level",
"equalizer_get_center_frequency",
"equalizer_get_band_freq_range",
"equalizer_get_num_presets"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": [
"NUM_EQ_BANDS... |
25,436 | Android | https://android.googlesource.com/platform/hardware/qcom/audio | post_proc/equalizer.c | d72ea85c78a1a68bf99fd5804ad9784b4102fe57 | Fix security vulnerability: Equalizer command might allow negative indexes
Bug: 32247948
Bug: 32438598
Bug: 32436341
Test: use POC on bug or cts security test
Change-Id: I56a92582687599b5b313dea1abcb8bcb19c7fc0e
(cherry picked from commit 3f37d4ef89f4f0eef9e201c5a91b7b2c77ed1071)
(cherry picked from commit ceb7b2d7a... | false | 818ca8e92b665092ffeb42b9b0577015 | equalizer_get_parameter | int equalizer_get_parameter(effect_context_t *context, effect_param_t *p,
uint32_t *size)
{
equalizer_context_t *eq_ctxt = (equalizer_context_t *)context;
int voffset = ((p->psize - 1) / sizeof(int32_t) + 1) * sizeof(int32_t);
int32_t *param_tmp = (int32_t *)p->data;
int32_t param = *param_tmp++;
int32_t param2;
... | [[268, " if (param2 < 0 || param2 >= NUM_EQ_BANDS) {"], [270, " if (param2 < 0) {"], [271, " android_errorWriteLog(0x534e4554, \"32438598\");"], [272, " ALOGW(\"\\tERROR EQ_PARAM_BAND_LEVEL band %d\", param2);"], [273, " }"], [282, " if (param2 < 0 || pa... | [] | [
"CVE-2017-0402"
] | [
"CWE-200"
] | 25,436 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"equalizer_get_band_level",
"equalizer_get_center_frequency",
"equalizer_get_band_freq_range",
"equalizer_get_num_presets"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": [
"NUM_EQ_BANDS... |
25,437 | Android | https://android.googlesource.com/platform/system/bt | stack/rfcomm/rfc_ts_frames.cc | 9fe27a9b445f7e911286ed31c1087ceac567736b | Add bound check for rfc_parse_data
Bug: 78288018
Test: manual
Change-Id: I44349cd22c141483d01bce0f5a2131b727d0feb0
(cherry picked from commit 6039cb7225733195192b396ad19c528800feb735)
| true | 0f95eaec2392eb2c7cce58832c24f9a6 | rfc_parse_data | uint8_t rfc_parse_data(tRFC_MCB* p_mcb, MX_FRAME* p_frame, BT_HDR* p_buf) {
uint8_t ead, eal, fcs;
uint8_t* p_data = (uint8_t*)(p_buf + 1) + p_buf->offset;
uint8_t* p_start = p_data;
uint16_t len;
if (p_buf->len < RFCOMM_CTRL_FRAME_LEN) {
RFCOMM_TRACE_ERROR("Bad Length1: %d", p_buf->len);
return (RFC_EVENT_B... | [[520, " RFCOMM_PARSE_LEN_FIELD(eal, len, p_data);"]] | [[18, "RFCOMM_PARSE_LEN_FIELD(eal, len, p_data);"]] | [
"CVE-2018-9503"
] | [
"CWE-125"
] | 25,438 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"RFCOMM_PARSE_LEN_FIELD"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": []
} |
25,438 | Android | https://android.googlesource.com/platform/system/bt | stack/rfcomm/rfc_ts_frames.cc | 9fe27a9b445f7e911286ed31c1087ceac567736b | Add bound check for rfc_parse_data
Bug: 78288018
Test: manual
Change-Id: I44349cd22c141483d01bce0f5a2131b727d0feb0
(cherry picked from commit 6039cb7225733195192b396ad19c528800feb735)
| false | 3b3302bd02a630bbd5c1c71a6a28c313 | rfc_parse_data | uint8_t rfc_parse_data(tRFC_MCB* p_mcb, MX_FRAME* p_frame, BT_HDR* p_buf) {
uint8_t ead, eal, fcs;
uint8_t* p_data = (uint8_t*)(p_buf + 1) + p_buf->offset;
uint8_t* p_start = p_data;
uint16_t len;
if (p_buf->len < RFCOMM_CTRL_FRAME_LEN) {
RFCOMM_TRACE_ERROR("Bad Length1: %d", p_buf->len);
return (RFC_EVENT_B... | [[521, " eal = *(p_data)&RFCOMM_EA;"], [522, " len = *(p_data)++ >> RFCOMM_SHIFT_LENGTH1;"], [523, " if (eal == 0 && p_buf->len < RFCOMM_CTRL_FRAME_LEN) {"], [524, " len += (*(p_data)++ << RFCOMM_SHIFT_LENGTH2);"], [525, " } else if (eal == 0) {"], [526, " RFCOMM_TRACE_ERROR(\"Bad Length when EAL = 0: %d\", p... | [[19, "eal = *(p_data)&RFCOMM_EA;"], [20, "len = *(p_data)++ >> RFCOMM_SHIFT_LENGTH1;"], [21, "if (eal == 0 && p_buf->len < RFCOMM_CTRL_FRAME_LEN)"], [22, "len += (*(p_data)++ << RFCOMM_SHIFT_LENGTH2);"], [23, "else if (eal == 0)"], [24, "RFCOMM_TRACE_ERROR(\"Bad Length when EAL = 0: %d\", p_buf->len);"], [25, "android... | [
"CVE-2018-9503"
] | [
"CWE-125"
] | 25,438 | {
"Execution Environment": [],
"Explanation": null,
"External Function": [
"RFCOMM_PARSE_LEN_FIELD"
],
"Function Argument": [],
"Globals": [],
"Type Execution Declaration": []
} |
25,439 | Android | https://android.googlesource.com/platform/system/bt | stack/rfcomm/rfc_ts_frames.cc | d4a34fefbf292d1e02336e4e272da3ef1e3eef85 | Fix a wrong check in rfc_parse_data
Bug: 78288018
Bug: 111436796
Test: manual
Change-Id: I16e6026acbaac230fe1453bbac040d1b75bcea2a
(cherry picked from commit d1ced302cd1066087588c891027b1756be31db46)
| false | 40d5e49b7f56b611ba56a42b2b3b6996 | rfc_parse_data | uint8_t rfc_parse_data(tRFC_MCB* p_mcb, MX_FRAME* p_frame, BT_HDR* p_buf) {
uint8_t ead, eal, fcs;
uint8_t* p_data = (uint8_t*)(p_buf + 1) + p_buf->offset;
uint8_t* p_start = p_data;
uint16_t len;
if (p_buf->len < RFCOMM_CTRL_FRAME_LEN) {
RFCOMM_TRACE_ERROR("Bad Length1: %d", p_buf->len);
return (RFC_EVENT_B... | [[523, " if (eal == 0 && p_buf->len > RFCOMM_CTRL_FRAME_LEN) {"]] | [[21, "if (eal == 0 && p_buf->len > RFCOMM_CTRL_FRAME_LEN)"]] | [
"CVE-2018-9503"
] | [
"CWE-125"
] | null | {
"Execution Environment": null,
"Explanation": null,
"External Function": null,
"Function Argument": null,
"Globals": null,
"Type Execution Declaration": null
} |
Subsets and Splits
GitHub Repo File Analysis
Identifies the most common file types and their counts in GitHub repositories, providing insights into the predominant programming languages used.
Top 200 CWE-863
Retrieves 200 samples from the dataset where the CWE list includes CWE-863, providing basic filtering of specific security vulnerabilities.