idx
int64
0
25.4k
project
stringclasses
707 values
project_url
stringclasses
735 values
filepath
stringlengths
4
100
commit_id
stringlengths
7
40
commit_message
stringlengths
0
18.3k
is_vulnerable
bool
2 classes
hash
stringlengths
32
32
func_name
stringlengths
3
112
func_body
stringlengths
23
235k
changed_lines
stringlengths
2
27.6k
changed_statements
stringlengths
2
161k
cve_list
listlengths
1
19
cwe_list
listlengths
1
6
fixed_func_idx
int64
1
25.4k
context
dict
25,400
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
true
2617f5ebb2cfe06d8598ee4780f11ec3
SubpelVarianceTest<SubpelVarianceFunctionType>::RefTest
void SubpelVarianceTest<SubpelVarianceFunctionType>::RefTest() { for (int x = 0; x < 16; ++x) { for (int y = 0; y < 16; ++y) { for (int j = 0; j < block_size_; j++) { src_[j] = rnd.Rand8(); } for (int j = 0; j < block_size_ + width_ + height_ + 1; j++) { ref_[j] = rnd.Rand8(); ...
[[48, " }"], [137, " src_[j] = rnd.Rand8();"], [138, " ref_[j] = rnd.Rand8();"], [187, " }"], [188, " }"], [191, "}"], [239, " for (int x = 0; x < 16; ++x) {"], [240, " for (int y = 0; y < 16; ++y) {"], [241, " for (int j = 0; j < block_size_; j++) {"], [242, " src_[j] = rnd.Rand8();"],...
[]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,410
{ "Execution Environment": [], "Explanation": null, "External Function": [ "subpel_variance_", "subpel_variance_ref" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [ "block_size_", "width_", "height_", "src_", "ref_", "log2width_", "log2height_...
25,401
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
true
7f0d96f6420c414904d3da889d95ef6a
SubpelVarianceTest<vp9_subp_avg_variance_fn_t>::RefTest
void SubpelVarianceTest<vp9_subp_avg_variance_fn_t>::RefTest() { for (int x = 0; x < 16; ++x) { for (int y = 0; y < 16; ++y) { for (int j = 0; j < block_size_; j++) { src_[j] = rnd.Rand8(); sec_[j] = rnd.Rand8(); } for (int j = 0; j < block_size_ + width_ + height_ + 1; j++) { ...
[[48, " }"], [137, " src_[j] = rnd.Rand8();"], [138, " ref_[j] = rnd.Rand8();"], [187, " }"], [188, " }"], [191, "}"], [239, " for (int x = 0; x < 16; ++x) {"], [240, " for (int y = 0; y < 16; ++y) {"], [241, " for (int j = 0; j < block_size_; j++) {"], [242, " src_[j] = rnd.Rand8();"],...
[]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,411
{ "Execution Environment": [], "Explanation": null, "External Function": [ "subpel_variance_", "subpel_avg_variance_ref" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [ "block_size_", "width_", "height_", "src_", "ref_", "sec_" ] }
25,402
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
true
656ccea24c0764d94dec300f1ca6c847
SetUp
virtual void SetUp() { const tuple<int, int, SubpelVarianceFunctionType>& params = this->GetParam(); log2width_ = get<0>(params); width_ = 1 << log2width_; log2height_ = get<1>(params); height_ = 1 << log2height_; subpel_variance_ = get<2>(params); rnd(ACMRandom::Determini...
[[199, " const tuple<int, int, SubpelVarianceFunctionType>& params ="], [200, " this->GetParam();"], [205, " subpel_variance_ = get<2>(params);"], [210, " sec_ = reinterpret_cast<uint8_t *>(vpx_memalign(16, block_size_));"], [211, " ref_ = new uint8_t[block_size_ + width_ + height_ + 1];"], [213, " ...
[[1, "const tuple<int, int, SubpelVarianceFunctionType>& params =\n this->GetParam();"], [7, "subpel_variance_ = get<2>(params);"], [12, "sec_ = reinterpret_cast<uint8_t *>(vpx_memalign(16, block_size_));"], [13, "ref_ = new uint8_t[block_size_ + width_ + height_ + 1];"], [15, "ASSERT_TRUE(sec_ != NULL);"]]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,412
{ "Execution Environment": [], "Explanation": null, "External Function": [ "vpx_memalign", "this->GetParam" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [ "SubpelVarianceFunctionType", "MseFunctionType" ] }
25,403
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
true
300d6d411da5a2a9186c6d8674658ff1
TearDown
virtual void TearDown() { vpx_free(src_); delete[] ref_; vpx_free(sec_); libvpx_test::ClearSystemState(); }
[[220, " vpx_free(sec_);"]]
[[3, "vpx_free(sec_);"]]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,413
{ "Execution Environment": [], "Explanation": null, "External Function": [], "Function Argument": [], "Globals": [ "use_high_bit_depth_" ], "Type Execution Declaration": [] }
25,404
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
true
00f5d0f70e1982c538264adb18a583fb
VarianceTest<VarianceFunctionType>::ZeroTest
void VarianceTest<VarianceFunctionType>::ZeroTest() { for (int i = 0; i <= 255; ++i) { memset(src_, i, block_size_); for (int j = 0; j <= 255; ++j) { memset(ref_, j, block_size_); unsigned int sse; unsigned int var; REGISTER_STATE_CHECK(var = variance_(src_, width_, ref_, width_, ...
[[122, " memset(src_, i, block_size_);"], [124, " memset(ref_, j, block_size_);"], [127, " REGISTER_STATE_CHECK(var = variance_(src_, width_, ref_, width_, &sse));"], [128, " EXPECT_EQ(0u, var) << \"src values: \" << i << \"ref values: \" << j;"], [158, " REGISTER_STATE_CHECK(var = variance_(src_, wi...
[[2, "memset(src_, i, block_size_);"], [4, "memset(ref_, j, block_size_);"], [7, "REGISTER_STATE_CHECK(var = variance_(src_, width_, ref_, width_, &sse));"], [8, "EXPECT_EQ(0u, var) << \"src values: \" << i << \"ref values: \" << j;"]]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,414
{ "Execution Environment": [], "Explanation": null, "External Function": [ "variance_" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [] }
25,405
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
true
d03d1614b57ba66f8db84d26d6c94b83
subpel_avg_variance_ref
unsigned int subpel_avg_variance_ref(const uint8_t *ref, const uint8_t *src, const uint8_t *second_pred, int l2w, int l2h, int xoff, int yoff, ...
[[40, " int se = 0;"], [41, " unsigned int sse = 0;"], [42, " const int w = 1 << l2w, h = 1 << l2h;"], [43, " for (int y = 0; y < h; y++) {"], [44, " for (int x = 0; x < w; x++) {"], [46, " se += diff;"], [47, " sse += diff * diff;"], [48, " }"], [50, " *sse_ptr = sse;"], [51, " return sse - (((in...
[]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
null
{ "Execution Environment": [], "Explanation": null, "External Function": [], "Function Argument": [ "ref", "src", "second_pred", "l2w", "l2h" ], "Globals": [], "Type Execution Declaration": [] }
25,406
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
true
faa408873c0998dfd45d3963cc09fd44
subpel_variance_ref
static unsigned int subpel_variance_ref(const uint8_t *ref, const uint8_t *src, int l2w, int l2h, int xoff, int yoff, unsigned int *sse_ptr) { int se = 0; unsigned int sse = 0; const int w = 1 << l2w, h = 1 << l2h; for (int y = 0; ...
[[40, " int se = 0;"], [41, " unsigned int sse = 0;"], [42, " const int w = 1 << l2w, h = 1 << l2h;"], [46, " se += diff;"], [47, " sse += diff * diff;"], [50, " *sse_ptr = sse;"], [51, " return sse - (((int64_t) se * se) >> (l2w + l2h));"], [55, " int l2w, int l2h,...
[]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,415
{ "Execution Environment": [], "Explanation": null, "External Function": [], "Function Argument": [ "ref", "src", "l2w", "l2h" ], "Globals": [], "Type Execution Declaration": [] }
25,407
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
true
53349cace652e3f91fe35a64b4b2062e
variance_ref
static unsigned int variance_ref(const uint8_t *ref, const uint8_t *src, int l2w, int l2h, unsigned int *sse_ptr) { int se = 0; unsigned int sse = 0; const int w = 1 << l2w, h = 1 << l2h; for (int y = 0; y < h; y++) { for (int x = 0; x < w; x++) { int diff = ref[w * y ...
[[39, " int l2w, int l2h, unsigned int *sse_ptr) {"], [40, " int se = 0;"], [41, " unsigned int sse = 0;"], [42, " const int w = 1 << l2w, h = 1 << l2h;"], [43, " for (int y = 0; y < h; y++) {"], [44, " for (int x = 0; x < w; x++) {"], [45, " int diff = ref[w * y + x] - src[w...
[]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,416
{ "Execution Environment": [], "Explanation": null, "External Function": [], "Function Argument": [ "ref", "src" ], "Globals": [], "Type Execution Declaration": [] }
25,408
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
false
51f70436904fb74cab9bf7de6e288081
VarianceTest<VarianceFunctionType>::OneQuarterTest
void VarianceTest<VarianceFunctionType>::OneQuarterTest() { const int half = block_size_ / 2; if (!use_high_bit_depth_) { memset(src_, 255, block_size_); memset(ref_, 255, half); memset(ref_ + half, 0, half); #if CONFIG_VP9_HIGHBITDEPTH } else { vpx_memset16(CONVERT_TO_SHORTPTR(src_), 255 << (bi...
[[73, " }"], [75, "}"], [89, " if (!use_high_bit_depth_) {"], [94, "#if CONFIG_VP9_HIGHBITDEPTH"], [95, " } else {"], [100, "#endif // CONFIG_VP9_HIGHBITDEPTH"], [101, " }"], [109, "}"], [133, " if (!use_high_bit_depth_) {"], [144, "#if CONFIG_VP9_HIGHBITDEPTH"], [145, " } else {"], [158, "#e...
[]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,408
{ "Execution Environment": [], "Explanation": null, "External Function": [ "variance_" ], "Function Argument": [], "Globals": [ "block_size_", "width_", "use_high_bit_depth_", "bit_depth_" ], "Type Execution Declaration": [ "src_", "ref_" ] }
25,409
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
false
aa7af9515e973d9baba8ba3658f35316
VarianceTest<VarianceFunctionType>::RefTest
void VarianceTest<VarianceFunctionType>::RefTest() { for (int i = 0; i < 10; ++i) { for (int j = 0; j < block_size_; j++) { if (!use_high_bit_depth_) { src_[j] = rnd_.Rand8(); ref_[j] = rnd_.Rand8(); #if CONFIG_VP9_HIGHBITDEPTH } else { CONVERT_TO_SHORTPTR(src_)[j] = rnd_.Rand16() && ...
[[73, " }"], [75, "}"], [89, " if (!use_high_bit_depth_) {"], [94, "#if CONFIG_VP9_HIGHBITDEPTH"], [95, " } else {"], [100, "#endif // CONFIG_VP9_HIGHBITDEPTH"], [101, " }"], [109, "}"], [133, " if (!use_high_bit_depth_) {"], [144, "#if CONFIG_VP9_HIGHBITDEPTH"], [145, " } else {"], [158, "#e...
[]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,409
{ "Execution Environment": [], "Explanation": null, "External Function": [ "variance_", "variance_ref" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [ "block_size_", "src_", "ref_", "width_", "log2width_", "log2height_" ] }
25,410
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
false
fd39d7a0fba2f868c85dee5e33ca2d16
SubpelVarianceTest<SubpelVarianceFunctionType>::RefTest
void SubpelVarianceTest<SubpelVarianceFunctionType>::RefTest() { for (int x = 0; x < 8; ++x) { for (int y = 0; y < 8; ++y) { if (!use_high_bit_depth_) { for (int j = 0; j < block_size_; j++) { src_[j] = rnd_.Rand8(); } for (int j = 0; j < block_size_ + width_ + height_ + 1...
[[73, " }"], [75, "}"], [89, " if (!use_high_bit_depth_) {"], [94, "#if CONFIG_VP9_HIGHBITDEPTH"], [95, " } else {"], [100, "#endif // CONFIG_VP9_HIGHBITDEPTH"], [101, " }"], [109, "}"], [133, " if (!use_high_bit_depth_) {"], [144, "#if CONFIG_VP9_HIGHBITDEPTH"], [145, " } else {"], [158, "#e...
[]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,410
{ "Execution Environment": [], "Explanation": null, "External Function": [ "subpel_variance_", "subpel_variance_ref" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [ "block_size_", "width_", "height_", "src_", "ref_", "log2width_", "log2height_...
25,411
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
false
acfe79013b6479ac7b948d4b10e4715f
SubpelVarianceTest<vp9_subp_avg_variance_fn_t>::RefTest
void SubpelVarianceTest<vp9_subp_avg_variance_fn_t>::RefTest() { void SubpelVarianceTest<SubpixAvgVarMxNFunc>::RefTest() { for (int x = 0; x < 8; ++x) { for (int y = 0; y < 8; ++y) { if (!use_high_bit_depth_) { for (int j = 0; j < block_size_; j++) { src_[j] = rnd_.Rand8(); sec_[...
[[73, " }"], [75, "}"], [89, " if (!use_high_bit_depth_) {"], [94, "#if CONFIG_VP9_HIGHBITDEPTH"], [95, " } else {"], [100, "#endif // CONFIG_VP9_HIGHBITDEPTH"], [101, " }"], [109, "}"], [133, " if (!use_high_bit_depth_) {"], [144, "#if CONFIG_VP9_HIGHBITDEPTH"], [145, " } else {"], [158, "#e...
[]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,411
{ "Execution Environment": [], "Explanation": null, "External Function": [ "subpel_variance_", "subpel_avg_variance_ref" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [ "block_size_", "width_", "height_", "src_", "ref_", "sec_" ] }
25,412
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
false
bfecfbb5c3a2d5ffdc900c9964aa540e
SetUp
virtual void SetUp() { const tuple<int, int, MseFunctionType>& params = this->GetParam(); log2width_ = get<0>(params); width_ = 1 << log2width_; log2height_ = get<1>(params); height_ = 1 << log2height_; mse_ = get<2>(params); rnd(ACMRandom::DeterministicSeed()); block_size_ =...
[[396, " const tuple<int, int, MseFunctionType>& params = this->GetParam();"], [401, " mse_ = get<2>(params);"], [406, " ref_ = new uint8_t[block_size_];"], [548, " this->GetParam();"]]
[]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,412
{ "Execution Environment": [], "Explanation": null, "External Function": [ "vpx_memalign", "this->GetParam" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [ "SubpelVarianceFunctionType", "MseFunctionType" ] }
25,413
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
false
afccbb1a8f7ff9907af1a76a91b7a581
TearDown
virtual void TearDown() { vpx_free(src_); delete[] ref_; libvpx_test::ClearSystemState(); } protected: void RefTest_mse(); void RefTest_sse(); void MaxTest_mse(); void MaxTest_sse(); ACMRandom rnd; uint8_t* src_; uint8_t* ref_; int width_, log2width_; int height_, log2height_; ...
[[73, " }"], [75, "}"], [81, " vpx_bit_depth_t bit_depth) {"], [82, " int64_t se = 0;"], [83, " uint64_t sse = 0;"], [84, " const int w = 1 << l2w;"], [85, " const int h = 1 << l2h;"], [89, " if (!use_high_bit_depth_) {"], [92, " se += diff;"], [93, " sse += diff * di...
[]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,413
{ "Execution Environment": [], "Explanation": null, "External Function": [], "Function Argument": [], "Globals": [ "use_high_bit_depth_" ], "Type Execution Declaration": [] }
25,414
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
false
12e9b6a7d1b35f3a32ee3391d6599586
VarianceTest<VarianceFunctionType>::ZeroTest
void VarianceTest<VarianceFunctionType>::ZeroTest() { for (int i = 0; i <= 255; ++i) { if (!use_high_bit_depth_) { memset(src_, i, block_size_); #if CONFIG_VP9_HIGHBITDEPTH } else { vpx_memset16(CONVERT_TO_SHORTPTR(src_), i << (bit_depth_ - 8), block_size_); #endif // CONFIG_...
[[73, " }"], [75, "}"], [89, " if (!use_high_bit_depth_) {"], [94, "#if CONFIG_VP9_HIGHBITDEPTH"], [95, " } else {"], [100, "#endif // CONFIG_VP9_HIGHBITDEPTH"], [101, " }"], [109, "}"], [133, " if (!use_high_bit_depth_) {"], [144, "#if CONFIG_VP9_HIGHBITDEPTH"], [145, " } else {"], [158, "#e...
[]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,414
{ "Execution Environment": [], "Explanation": null, "External Function": [ "variance_" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [] }
25,415
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
false
6e799ebc1e60dd6568d314d559da7ac8
subpel_variance_ref
static unsigned int subpel_variance_ref(const uint8_t *ref, const uint8_t *src, static unsigned int mb_ss_ref(const int16_t *src) { unsigned int res = 0; for (int i = 0; i < 256; ++i) { res += src[i] * src[i]; } return res; } static uint32_t variance_ref(const uint8_t *src, const uint8_t *ref, ...
[[69, "static unsigned int mb_ss_ref(const int16_t *src) {"], [70, " unsigned int res = 0;"], [71, " for (int i = 0; i < 256; ++i) {"], [72, " res += src[i] * src[i];"], [73, " }"], [74, " return res;"], [75, "}"], [77, "static uint32_t variance_ref(const uint8_t *src, const uint8_t *ref,"], [78, " ...
[]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,415
{ "Execution Environment": [], "Explanation": null, "External Function": [], "Function Argument": [ "ref", "src", "l2w", "l2h" ], "Globals": [], "Type Execution Declaration": [] }
25,416
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/variance_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
false
bce65efa2b8af39b2c1168bcef1c8129
variance_ref
static unsigned int variance_ref(const uint8_t *ref, const uint8_t *src, //// Truncate high bit depth results by downshifting (with rounding) by: //// 2 * (bit_depth - 8) for sse //// (bit_depth - 8) for se static void RoundHighBitDepth(int bit_depth, int64_t *se, uint64_t *sse) { switch (bit_depth) { case VPX_BI...
[[53, "static void RoundHighBitDepth(int bit_depth, int64_t *se, uint64_t *sse) {"], [54, " switch (bit_depth) {"], [55, " case VPX_BITS_12:"], [56, " *sse = (*sse + 128) >> 8;"], [57, " *se = (*se + 8) >> 4;"], [58, " break;"], [59, " case VPX_BITS_10:"], [60, " *sse = (*sse + 8) >> 4;"], [6...
[[0, "static unsigned int variance_ref(const uint8_t *ref, const uint8_t *src,\n//// Truncate high bit depth results by downshifting (with rounding) by:\n//// 2 * (bit_depth - 8) for sse\n//// (bit_depth - 8) for se\nstatic void RoundHighBitDepth(int bit_depth, int64_t *se, uint64_t *sse) {"], [5, "switch (bit_depth) {...
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,416
{ "Execution Environment": [], "Explanation": null, "External Function": [], "Function Argument": [ "ref", "src" ], "Globals": [], "Type Execution Declaration": [] }
25,417
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/vp9_lossless_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
false
5b0d1874b2cdd9f03e41d6d62095c9fc
LosslessTestLarge
LosslessTestLarge() LosslessTest() : EncoderTest(GET_PARAM(0)), psnr_(kMaxPsnr), nframes_(0), encoding_mode_(GET_PARAM(1)) { }
[[27, " LosslessTest()"]]
[[1, "LosslessTest()\n : EncoderTest(GET_PARAM(0)),\n psnr_(kMaxPsnr),\n nframes_(0),\n encoding_mode_(GET_PARAM(1))"]]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
null
{ "Execution Environment": null, "Explanation": null, "External Function": null, "Function Argument": null, "Globals": null, "Type Execution Declaration": null }
25,418
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/vp9_thread_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
true
fdb274e1e7feccb4d3e2688feda6ee81
DecodeFile
string DecodeFile(const string& filename, int num_threads) { libvpx_test::WebMVideoSource video(filename); video.Init(); vpx_codec_dec_cfg_t cfg = {0}; cfg.threads = num_threads; libvpx_test::VP9Decoder decoder(cfg, 0); libvpx_test::MD5 md5; for (video.Begin(); video.cxdata(); video.Next()) { con...
[[61, " }"], [84, " }"], [105, " vpx_codec_dec_cfg_t cfg = {0};"], [152, " }"], [153, " }"], [212, " }"], [213, " }"]]
[]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,421
{ "Execution Environment": [], "Explanation": null, "External Function": [ "libvpx_test::WebMVideoSource", "libvpx_test::VP9Decoder", "libvpx_test::MD5", "decoder.DecodeFrame", "decoder.GetDxData", "dec_iter.Next", "md5.Get" ], "Function Argument": [ "filename", "num_thread...
25,419
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/vp9_thread_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
true
e0913b9251a51aabdbd412b06141e06c
SetUp
virtual void SetUp() { vp9_worker_init(&worker_); }
[[28, " vp9_worker_init(&worker_);"]]
[[1, "vp9_worker_init(&worker_);"]]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,422
{ "Execution Environment": [], "Explanation": null, "External Function": [ "vp9_worker_init", "vpx_get_worker_interface" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [] }
25,420
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/vp9_thread_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
true
3e51cb378644935819503abed66a45d6
TearDown
virtual void TearDown() { vp9_worker_end(&worker_); }
[[32, " vp9_worker_end(&worker_);"]]
[[1, "vp9_worker_end(&worker_);"]]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,423
{ "Execution Environment": [], "Explanation": null, "External Function": [ "vp9_worker_end", "vpx_get_worker_interface" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [ "worker_" ] }
25,421
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/vp9_thread_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
false
0543570fb582de7596892c5a2397105a
DecodeFile
string DecodeFile(const string& filename, int num_threads) { libvpx_test::WebMVideoSource video(filename); video.Init(); vpx_codec_dec_cfg_t cfg = vpx_codec_dec_cfg_t(); cfg.threads = num_threads; libvpx_test::VP9Decoder decoder(cfg, 0); libvpx_test::MD5 md5; for (video.Begin(); video.cxdata(); vi...
[[166, " vpx_codec_dec_cfg_t cfg = vpx_codec_dec_cfg_t();"]]
[[4, "vpx_codec_dec_cfg_t cfg = vpx_codec_dec_cfg_t();"]]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,421
{ "Execution Environment": [], "Explanation": null, "External Function": [ "libvpx_test::WebMVideoSource", "libvpx_test::VP9Decoder", "libvpx_test::MD5", "decoder.DecodeFrame", "decoder.GetDxData", "dec_iter.Next", "md5.Get" ], "Function Argument": [ "filename", "num_thread...
25,422
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/vp9_thread_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
false
41e0dcc79a86223bbd626e825f1bb82b
SetUp
virtual void SetUp() { vpx_get_worker_interface()->init(&worker_); }
[[31, " vpx_get_worker_interface()->init(&worker_);"]]
[[1, "vpx_get_worker_interface()->init(&worker_);"]]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,422
{ "Execution Environment": [], "Explanation": null, "External Function": [ "vp9_worker_init", "vpx_get_worker_interface" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [] }
25,423
Android
https://android.googlesource.com/platform/external/libvpx
libvpx/test/vp9_thread_test.cc
5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
false
961e31caf869c06e65796eb30694b510
TearDown
virtual void TearDown() { vpx_get_worker_interface()->end(&worker_); }
[[35, " vpx_get_worker_interface()->end(&worker_);"]]
[[1, "vpx_get_worker_interface()->end(&worker_);"]]
[ "CVE-2016-1621" ]
[ "CWE-119" ]
25,423
{ "Execution Environment": [], "Explanation": null, "External Function": [ "vp9_worker_end", "vpx_get_worker_interface" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [ "worker_" ] }
25,424
Android
https://android.googlesource.com/platform/external/sonivox
arm-wt-22k/lib_src/eas_wtengine.c
24d7c408c52143bce7b49de82f3913fd8d1219cf
Sonivox: add SafetyNet log. Bug: 26366256 Change-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0
false
cb9118619bf6621d648b3968a892eb1a
WT_Interpolate
void WT_Interpolate (S_WT_VOICE *pWTVoice, S_WT_INT_FRAME *pWTIntFrame) { EAS_PCM *pOutputBuffer; EAS_I32 phaseInc; EAS_I32 phaseFrac; EAS_I32 acc0; const EAS_SAMPLE *pSamples; const EAS_SAMPLE *loopEnd; EAS_I32 samp1; EAS_I32 samp2; EAS_I32 numSamples; /* initialize some local variables...
[[96, " android_errorWriteLog(0x534e4554, \"26366256\");"], [195, " android_errorWriteLog(0x534e4554, \"26366256\");"], [293, " android_errorWriteLog(0x534e4554, \"26366256\");"], [386, " android_errorWriteLog(0x534e4554, \"26366256\");"], [454, " android_errorWriteLog(0x534e4554, \"2...
[[17, "android_errorWriteLog(0x534e4554, \"26366256\");"]]
[ "CVE-2016-0838" ]
[ "CWE-119" ]
null
{ "Execution Environment": null, "Explanation": null, "External Function": null, "Function Argument": null, "Globals": null, "Type Execution Declaration": null }
25,425
Android
https://android.googlesource.com/platform/external/sonivox
arm-wt-22k/lib_src/eas_wtengine.c
24d7c408c52143bce7b49de82f3913fd8d1219cf
Sonivox: add SafetyNet log. Bug: 26366256 Change-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0
false
94f1230178313f35119d0bda43ab5531
WT_InterpolateMono
void WT_InterpolateMono (S_WT_VOICE *pWTVoice, S_WT_INT_FRAME *pWTIntFrame) { EAS_I32 *pMixBuffer; const EAS_I8 *pLoopEnd; const EAS_I8 *pCurrentPhaseInt; EAS_I32 numSamples; EAS_I32 gain; EAS_I32 gainIncrement; EAS_I32 currentPhaseFrac; EAS_I32 phaseInc; EAS_I32 tmp0; EAS_I32 tmp1; ...
[[96, " android_errorWriteLog(0x534e4554, \"26366256\");"], [195, " android_errorWriteLog(0x534e4554, \"26366256\");"], [293, " android_errorWriteLog(0x534e4554, \"26366256\");"], [386, " android_errorWriteLog(0x534e4554, \"26366256\");"], [454, " android_errorWriteLog(0x534e4554, \"2...
[[19, "android_errorWriteLog(0x534e4554, \"26366256\");"]]
[ "CVE-2016-0838" ]
[ "CWE-119" ]
null
{ "Execution Environment": null, "Explanation": null, "External Function": null, "Function Argument": null, "Globals": null, "Type Execution Declaration": null }
25,426
Android
https://android.googlesource.com/platform/external/sonivox
arm-wt-22k/lib_src/eas_wtengine.c
24d7c408c52143bce7b49de82f3913fd8d1219cf
Sonivox: add SafetyNet log. Bug: 26366256 Change-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0
false
b86ab9a6e87b46203c4674a298754b15
WT_InterpolateNoLoop
void WT_InterpolateNoLoop (S_WT_VOICE *pWTVoice, S_WT_INT_FRAME *pWTIntFrame) { EAS_PCM *pOutputBuffer; EAS_I32 phaseInc; EAS_I32 phaseFrac; EAS_I32 acc0; const EAS_SAMPLE *pSamples; EAS_I32 samp1; EAS_I32 samp2; EAS_I32 numSamples; /* initialize some local variables */ numSamples =...
[[96, " android_errorWriteLog(0x534e4554, \"26366256\");"], [195, " android_errorWriteLog(0x534e4554, \"26366256\");"], [293, " android_errorWriteLog(0x534e4554, \"26366256\");"], [386, " android_errorWriteLog(0x534e4554, \"26366256\");"], [454, " android_errorWriteLog(0x534e4554, \"2...
[[16, "android_errorWriteLog(0x534e4554, \"26366256\");"]]
[ "CVE-2016-0838" ]
[ "CWE-119" ]
null
{ "Execution Environment": null, "Explanation": null, "External Function": null, "Function Argument": null, "Globals": null, "Type Execution Declaration": null }
25,427
Android
https://android.googlesource.com/platform/external/sonivox
arm-wt-22k/lib_src/eas_wtengine.c
24d7c408c52143bce7b49de82f3913fd8d1219cf
Sonivox: add SafetyNet log. Bug: 26366256 Change-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0
false
6e391d560bab6570c0d171ac619eb9b7
WT_NoiseGenerator
void WT_NoiseGenerator (S_WT_VOICE *pWTVoice, S_WT_INT_FRAME *pWTIntFrame) { EAS_PCM *pOutputBuffer; EAS_I32 phaseInc; EAS_I32 tmp0; EAS_I32 tmp1; EAS_I32 nInterpolatedSample; EAS_I32 numSamples; /* initialize some local variables */ numSamples = pWTIntFrame->numSamples; if (numSa...
[[96, " android_errorWriteLog(0x534e4554, \"26366256\");"], [195, " android_errorWriteLog(0x534e4554, \"26366256\");"], [293, " android_errorWriteLog(0x534e4554, \"26366256\");"], [386, " android_errorWriteLog(0x534e4554, \"26366256\");"], [454, " android_errorWriteLog(0x534e4554, \"2...
[[14, "android_errorWriteLog(0x534e4554, \"26366256\");"]]
[ "CVE-2016-0838" ]
[ "CWE-119" ]
null
{ "Execution Environment": null, "Explanation": null, "External Function": null, "Function Argument": null, "Globals": null, "Type Execution Declaration": null }
25,428
Android
https://android.googlesource.com/platform/external/sonivox
arm-wt-22k/lib_src/eas_wtengine.c
24d7c408c52143bce7b49de82f3913fd8d1219cf
Sonivox: add SafetyNet log. Bug: 26366256 Change-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0
false
47e01403cbf7e9de6862d5444fafea00
WT_VoiceFilter
void WT_VoiceFilter (S_FILTER_CONTROL *pFilter, S_WT_INT_FRAME *pWTIntFrame) { EAS_PCM *pAudioBuffer; EAS_I32 k; EAS_I32 b1; EAS_I32 b2; EAS_I32 z1; EAS_I32 z2; EAS_I32 acc0; EAS_I32 acc1; EAS_I32 numSamples; /* initialize some local variables */ numSamples = pWTIntFrame->num...
[[96, " android_errorWriteLog(0x534e4554, \"26366256\");"], [195, " android_errorWriteLog(0x534e4554, \"26366256\");"], [293, " android_errorWriteLog(0x534e4554, \"26366256\");"], [386, " android_errorWriteLog(0x534e4554, \"26366256\");"], [454, " android_errorWriteLog(0x534e4554, \"2...
[[17, "android_errorWriteLog(0x534e4554, \"26366256\");"]]
[ "CVE-2016-0838" ]
[ "CWE-119" ]
null
{ "Execution Environment": null, "Explanation": null, "External Function": null, "Function Argument": null, "Globals": null, "Type Execution Declaration": null }
25,429
Android
https://android.googlesource.com/platform/external/sonivox
arm-wt-22k/lib_src/eas_wtengine.c
24d7c408c52143bce7b49de82f3913fd8d1219cf
Sonivox: add SafetyNet log. Bug: 26366256 Change-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0
false
1e1cb026fcaef4c2d606828fc96e19b5
WT_VoiceGain
void WT_VoiceGain (S_WT_VOICE *pWTVoice, S_WT_INT_FRAME *pWTIntFrame) { EAS_I32 *pMixBuffer; EAS_PCM *pInputBuffer; EAS_I32 gain; EAS_I32 gainIncrement; EAS_I32 tmp0; EAS_I32 tmp1; EAS_I32 tmp2; EAS_I32 numSamples; #if (NUM_OUTPUT_CHANNELS == 2) EAS_I32 gainLeft, gainRight; #endif ...
[[96, " android_errorWriteLog(0x534e4554, \"26366256\");"], [195, " android_errorWriteLog(0x534e4554, \"26366256\");"], [293, " android_errorWriteLog(0x534e4554, \"26366256\");"], [386, " android_errorWriteLog(0x534e4554, \"26366256\");"], [454, " android_errorWriteLog(0x534e4554, \"2...
[[20, "android_errorWriteLog(0x534e4554, \"26366256\");"]]
[ "CVE-2016-0838" ]
[ "CWE-119" ]
null
{ "Execution Environment": null, "Explanation": null, "External Function": null, "Function Argument": null, "Globals": null, "Type Execution Declaration": null }
25,430
Android
https://android.googlesource.com/platform/external/sonivox
arm-wt-22k/lib_src/eas_wtsynth.c
24d7c408c52143bce7b49de82f3913fd8d1219cf
Sonivox: add SafetyNet log. Bug: 26366256 Change-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0
false
504c87438e1966350f627c71e925793f
WT_CheckSampleEnd
EAS_BOOL WT_CheckSampleEnd (S_WT_VOICE *pWTVoice, S_WT_INT_FRAME *pWTIntFrame, EAS_BOOL update) { EAS_U32 endPhaseAccum; EAS_U32 endPhaseFrac; EAS_I32 numSamples; EAS_BOOL done = EAS_FALSE; /* check to see if we hit the end of the waveform this time */ /*lint -e{703} use shift for performance */ ...
[[475, " android_errorWriteLog(0x534e4554, \"26366256\");"]]
[[27, "android_errorWriteLog(0x534e4554, \"26366256\");"]]
[ "CVE-2016-0838" ]
[ "CWE-119" ]
null
{ "Execution Environment": null, "Explanation": null, "External Function": null, "Function Argument": null, "Globals": null, "Type Execution Declaration": null }
25,431
Android
https://android.googlesource.com/platform/external/libmpeg2
decoder/impeg2d_pnb_pic.c
58a6822d7140137ce957c6d2fc20bae1374186c1
Return error for wrong mb_type If mb_type decoded returns an invalid type of MB, then return error Bug: 26070014 Change-Id: I66abcad5de1352dd42d05b1a13bb4176153b133c
true
de3c6d2a44ea066f8ec8834c9123e9d3
impeg2d_dec_p_b_slice
IMPEG2D_ERROR_CODES_T impeg2d_dec_p_b_slice(dec_state_t *ps_dec) { WORD16 *pi2_vld_out; UWORD32 i; yuv_buf_t *ps_cur_frm_buf = &ps_dec->s_cur_frm_buf; UWORD32 u4_frm_offset = 0; const dec_mb_params_t *ps_dec_mb_params; IMPEG2D_ERROR_CODES_T e_error = (IMPEG2D_ERROR_CODES_T)IVD_ERROR_N...
[[485, " impeg2d_dec_pnb_mb_params(ps_dec);"], [487, " impeg2d_dec_p_mb_params(ps_dec);"]]
[[44, "impeg2d_dec_pnb_mb_params(ps_dec);"], [46, "impeg2d_dec_p_mb_params(ps_dec);"]]
[ "CVE-2016-0835" ]
[ "CWE-119" ]
25,432
{ "Execution Environment": [], "Explanation": null, "External Function": [ "impeg2d_dec_pnb_mb_params", "impeg2d_dec_p_mb_params" ], "Function Argument": [ "ps_dec" ], "Globals": [], "Type Execution Declaration": [ "dec_state_t" ] }
25,432
Android
https://android.googlesource.com/platform/external/libmpeg2
decoder/impeg2d_pnb_pic.c
58a6822d7140137ce957c6d2fc20bae1374186c1
Return error for wrong mb_type If mb_type decoded returns an invalid type of MB, then return error Bug: 26070014 Change-Id: I66abcad5de1352dd42d05b1a13bb4176153b133c
false
1ee02e9c9093b00a6602ac1cf509a6d1
impeg2d_dec_p_b_slice
IMPEG2D_ERROR_CODES_T impeg2d_dec_p_b_slice(dec_state_t *ps_dec) { WORD16 *pi2_vld_out; UWORD32 i; yuv_buf_t *ps_cur_frm_buf = &ps_dec->s_cur_frm_buf; UWORD32 u4_frm_offset = 0; const dec_mb_params_t *ps_dec_mb_params; IMPEG2D_ERROR_CODES_T e_error = (IMPEG2D_ERROR_CODES_T)IVD_ERROR_N...
[[480, " WORD32 ret;"], [493, " ret = impeg2d_dec_pnb_mb_params(ps_dec);"], [495, " ret = impeg2d_dec_p_mb_params(ps_dec);"], [497, " if(ret)"], [498, " return IMPEG2D_MB_TEX_DECODE_ERR;"]]
[[31, "WORD32 ret;"], [45, "ret = impeg2d_dec_pnb_mb_params(ps_dec);"], [47, "ret = impeg2d_dec_p_mb_params(ps_dec);"], [49, "if(ret)"], [50, "return IMPEG2D_MB_TEX_DECODE_ERR;"]]
[ "CVE-2016-0835" ]
[ "CWE-119" ]
25,432
{ "Execution Environment": [], "Explanation": null, "External Function": [ "impeg2d_dec_pnb_mb_params", "impeg2d_dec_p_mb_params" ], "Function Argument": [ "ps_dec" ], "Globals": [], "Type Execution Declaration": [ "dec_state_t" ] }
25,433
Android
https://android.googlesource.com/platform/external/libmpeg2
decoder/impeg2d_pnb_pic.c
58a6822d7140137ce957c6d2fc20bae1374186c1
Return error for wrong mb_type If mb_type decoded returns an invalid type of MB, then return error Bug: 26070014 Change-Id: I66abcad5de1352dd42d05b1a13bb4176153b133c
false
2b47da91afa3915ab75d5bc89ff7a8d6
impeg2d_dec_p_mb_params
void impeg2d_dec_p_mb_params(dec_state_t *ps_dec) WORD32 impeg2d_dec_p_mb_params(dec_state_t *ps_dec) { stream_t *ps_stream = &ps_dec->s_bit_stream; UWORD16 u2_mb_addr_incr; UWORD16 u2_total_len; UWORD16 u2_len; UWORD16 u2_mb_type; UWORD32 u4_next_word; const dec_mb_params_t *ps_dec_mb_para...
[[63, "WORD32 impeg2d_dec_p_mb_params(dec_state_t *ps_dec)"], [183, " if(NULL == ps_dec_mb_params->pf_func_mb_params)"], [184, " return -1;"], [228, " return 0;"], [379, " if(NULL == ps_dec_mb_params->pf_func_mb_params)"], [380, " return -1;"], [392, " if(NULL == ps_dec_mb...
[[0, "void impeg2d_dec_p_mb_params(dec_state_t *ps_dec)\nWORD32 impeg2d_dec_p_mb_params(dec_state_t *ps_dec)"], [121, "if(NULL == ps_dec_mb_params->pf_func_mb_params)"], [122, "return -1;"]]
[ "CVE-2016-0835" ]
[ "CWE-119" ]
null
{ "Execution Environment": null, "Explanation": null, "External Function": null, "Function Argument": null, "Globals": null, "Type Execution Declaration": null }
25,434
Android
https://android.googlesource.com/platform/external/libmpeg2
decoder/impeg2d_pnb_pic.c
58a6822d7140137ce957c6d2fc20bae1374186c1
Return error for wrong mb_type If mb_type decoded returns an invalid type of MB, then return error Bug: 26070014 Change-Id: I66abcad5de1352dd42d05b1a13bb4176153b133c
false
d48798728d9d74d3f0d13221dd2a805d
impeg2d_dec_pnb_mb_params
void impeg2d_dec_pnb_mb_params(dec_state_t *ps_dec) WORD32 impeg2d_dec_pnb_mb_params(dec_state_t *ps_dec) { stream_t *ps_stream = &ps_dec->s_bit_stream; UWORD16 u2_mb_addr_incr; UWORD16 u2_total_len; UWORD16 u2_len; UWORD16 u2_mb_type; UWORD32 u4_next_word; const dec_mb_params_t *ps_dec_mb_p...
[[183, " if(NULL == ps_dec_mb_params->pf_func_mb_params)"], [184, " return -1;"], [228, " return 0;"], [243, "WORD32 impeg2d_dec_pnb_mb_params(dec_state_t *ps_dec)"], [379, " if(NULL == ps_dec_mb_params->pf_func_mb_params)"], [380, " return -1;"], [392, " if(NULL == ps_dec_...
[]
[ "CVE-2016-0835" ]
[ "CWE-119" ]
null
{ "Execution Environment": null, "Explanation": null, "External Function": null, "Function Argument": null, "Globals": null, "Type Execution Declaration": null }
25,435
Android
https://android.googlesource.com/platform/hardware/qcom/audio
post_proc/equalizer.c
d72ea85c78a1a68bf99fd5804ad9784b4102fe57
Fix security vulnerability: Equalizer command might allow negative indexes Bug: 32247948 Bug: 32438598 Bug: 32436341 Test: use POC on bug or cts security test Change-Id: I56a92582687599b5b313dea1abcb8bcb19c7fc0e (cherry picked from commit 3f37d4ef89f4f0eef9e201c5a91b7b2c77ed1071) (cherry picked from commit ceb7b2d7a...
true
f5dd8785e48577d9891482280421b70f
equalizer_get_parameter
int equalizer_get_parameter(effect_context_t *context, effect_param_t *p, uint32_t *size) { equalizer_context_t *eq_ctxt = (equalizer_context_t *)context; int voffset = ((p->psize - 1) / sizeof(int32_t) + 1) * sizeof(int32_t); int32_t *param_tmp = (int32_t *)p->data; int32_t param = *param_tmp++; int32_t param2; ...
[[268, " if (param2 >= NUM_EQ_BANDS) {"], [278, " if (param2 >= NUM_EQ_BANDS) {"], [279, " p->status = -EINVAL;"], [288, " if (param2 >= NUM_EQ_BANDS) {"]]
[]
[ "CVE-2017-0402" ]
[ "CWE-200" ]
25,436
{ "Execution Environment": [], "Explanation": null, "External Function": [ "equalizer_get_band_level", "equalizer_get_center_frequency", "equalizer_get_band_freq_range", "equalizer_get_num_presets" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [ "NUM_EQ_BANDS...
25,436
Android
https://android.googlesource.com/platform/hardware/qcom/audio
post_proc/equalizer.c
d72ea85c78a1a68bf99fd5804ad9784b4102fe57
Fix security vulnerability: Equalizer command might allow negative indexes Bug: 32247948 Bug: 32438598 Bug: 32436341 Test: use POC on bug or cts security test Change-Id: I56a92582687599b5b313dea1abcb8bcb19c7fc0e (cherry picked from commit 3f37d4ef89f4f0eef9e201c5a91b7b2c77ed1071) (cherry picked from commit ceb7b2d7a...
false
818ca8e92b665092ffeb42b9b0577015
equalizer_get_parameter
int equalizer_get_parameter(effect_context_t *context, effect_param_t *p, uint32_t *size) { equalizer_context_t *eq_ctxt = (equalizer_context_t *)context; int voffset = ((p->psize - 1) / sizeof(int32_t) + 1) * sizeof(int32_t); int32_t *param_tmp = (int32_t *)p->data; int32_t param = *param_tmp++; int32_t param2; ...
[[268, " if (param2 < 0 || param2 >= NUM_EQ_BANDS) {"], [270, " if (param2 < 0) {"], [271, " android_errorWriteLog(0x534e4554, \"32438598\");"], [272, " ALOGW(\"\\tERROR EQ_PARAM_BAND_LEVEL band %d\", param2);"], [273, " }"], [282, " if (param2 < 0 || pa...
[]
[ "CVE-2017-0402" ]
[ "CWE-200" ]
25,436
{ "Execution Environment": [], "Explanation": null, "External Function": [ "equalizer_get_band_level", "equalizer_get_center_frequency", "equalizer_get_band_freq_range", "equalizer_get_num_presets" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [ "NUM_EQ_BANDS...
25,437
Android
https://android.googlesource.com/platform/system/bt
stack/rfcomm/rfc_ts_frames.cc
9fe27a9b445f7e911286ed31c1087ceac567736b
Add bound check for rfc_parse_data Bug: 78288018 Test: manual Change-Id: I44349cd22c141483d01bce0f5a2131b727d0feb0 (cherry picked from commit 6039cb7225733195192b396ad19c528800feb735)
true
0f95eaec2392eb2c7cce58832c24f9a6
rfc_parse_data
uint8_t rfc_parse_data(tRFC_MCB* p_mcb, MX_FRAME* p_frame, BT_HDR* p_buf) { uint8_t ead, eal, fcs; uint8_t* p_data = (uint8_t*)(p_buf + 1) + p_buf->offset; uint8_t* p_start = p_data; uint16_t len; if (p_buf->len < RFCOMM_CTRL_FRAME_LEN) { RFCOMM_TRACE_ERROR("Bad Length1: %d", p_buf->len); return (RFC_EVENT_B...
[[520, " RFCOMM_PARSE_LEN_FIELD(eal, len, p_data);"]]
[[18, "RFCOMM_PARSE_LEN_FIELD(eal, len, p_data);"]]
[ "CVE-2018-9503" ]
[ "CWE-125" ]
25,438
{ "Execution Environment": [], "Explanation": null, "External Function": [ "RFCOMM_PARSE_LEN_FIELD" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [] }
25,438
Android
https://android.googlesource.com/platform/system/bt
stack/rfcomm/rfc_ts_frames.cc
9fe27a9b445f7e911286ed31c1087ceac567736b
Add bound check for rfc_parse_data Bug: 78288018 Test: manual Change-Id: I44349cd22c141483d01bce0f5a2131b727d0feb0 (cherry picked from commit 6039cb7225733195192b396ad19c528800feb735)
false
3b3302bd02a630bbd5c1c71a6a28c313
rfc_parse_data
uint8_t rfc_parse_data(tRFC_MCB* p_mcb, MX_FRAME* p_frame, BT_HDR* p_buf) { uint8_t ead, eal, fcs; uint8_t* p_data = (uint8_t*)(p_buf + 1) + p_buf->offset; uint8_t* p_start = p_data; uint16_t len; if (p_buf->len < RFCOMM_CTRL_FRAME_LEN) { RFCOMM_TRACE_ERROR("Bad Length1: %d", p_buf->len); return (RFC_EVENT_B...
[[521, " eal = *(p_data)&RFCOMM_EA;"], [522, " len = *(p_data)++ >> RFCOMM_SHIFT_LENGTH1;"], [523, " if (eal == 0 && p_buf->len < RFCOMM_CTRL_FRAME_LEN) {"], [524, " len += (*(p_data)++ << RFCOMM_SHIFT_LENGTH2);"], [525, " } else if (eal == 0) {"], [526, " RFCOMM_TRACE_ERROR(\"Bad Length when EAL = 0: %d\", p...
[[19, "eal = *(p_data)&RFCOMM_EA;"], [20, "len = *(p_data)++ >> RFCOMM_SHIFT_LENGTH1;"], [21, "if (eal == 0 && p_buf->len < RFCOMM_CTRL_FRAME_LEN)"], [22, "len += (*(p_data)++ << RFCOMM_SHIFT_LENGTH2);"], [23, "else if (eal == 0)"], [24, "RFCOMM_TRACE_ERROR(\"Bad Length when EAL = 0: %d\", p_buf->len);"], [25, "android...
[ "CVE-2018-9503" ]
[ "CWE-125" ]
25,438
{ "Execution Environment": [], "Explanation": null, "External Function": [ "RFCOMM_PARSE_LEN_FIELD" ], "Function Argument": [], "Globals": [], "Type Execution Declaration": [] }
25,439
Android
https://android.googlesource.com/platform/system/bt
stack/rfcomm/rfc_ts_frames.cc
d4a34fefbf292d1e02336e4e272da3ef1e3eef85
Fix a wrong check in rfc_parse_data Bug: 78288018 Bug: 111436796 Test: manual Change-Id: I16e6026acbaac230fe1453bbac040d1b75bcea2a (cherry picked from commit d1ced302cd1066087588c891027b1756be31db46)
false
40d5e49b7f56b611ba56a42b2b3b6996
rfc_parse_data
uint8_t rfc_parse_data(tRFC_MCB* p_mcb, MX_FRAME* p_frame, BT_HDR* p_buf) { uint8_t ead, eal, fcs; uint8_t* p_data = (uint8_t*)(p_buf + 1) + p_buf->offset; uint8_t* p_start = p_data; uint16_t len; if (p_buf->len < RFCOMM_CTRL_FRAME_LEN) { RFCOMM_TRACE_ERROR("Bad Length1: %d", p_buf->len); return (RFC_EVENT_B...
[[523, " if (eal == 0 && p_buf->len > RFCOMM_CTRL_FRAME_LEN) {"]]
[[21, "if (eal == 0 && p_buf->len > RFCOMM_CTRL_FRAME_LEN)"]]
[ "CVE-2018-9503" ]
[ "CWE-125" ]
null
{ "Execution Environment": null, "Explanation": null, "External Function": null, "Function Argument": null, "Globals": null, "Type Execution Declaration": null }