input
stringlengths
205
73.3k
output
stringlengths
64
73.2k
instruction
stringclasses
1 value
#vulnerable code @Override public List<net.runelite.deob.Method> getMethods() { ClassGroup group = this.getInstructions().getCode().getAttributes().getClassFile().getGroup(); ClassFile otherClass = group.findClass(method.getClassEntry().getName()); if (otherClass == null) ret...
#fixed code @Override public List<net.runelite.deob.Method> getMethods() { return myMethods != null ? myMethods : Arrays.asList(); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void test1() throws IOException { File file = folder.newFile(); Store store = new Store(); IndexFile index = new IndexFile(store, 5, file); IndexEntry entry = new IndexEntry(index, 7, 8, 9); index.write(entry); IndexEntry entry2 = index.read(7); ...
#fixed code @Test public void test1() throws IOException { File file = folder.newFile(); Store store = new Store(folder.getRoot()); IndexFile index = new IndexFile(store, 5, file); IndexEntry entry = new IndexEntry(index, 7, 8, 9); index.write(entry); IndexEntry entry2 = index...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void lookup() { ClassGroup group = this.getInstructions().getCode().getAttributes().getClassFile().getGroup(); ClassFile otherClass = group.findClass(method.getClassEntry().getName()); if (otherClass == null) return; // not our class net...
#fixed code @Override public void lookup() { myMethod = lookupMethod(); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public List<net.runelite.deob.Method> getMethods() { ClassGroup group = this.getInstructions().getCode().getAttributes().getClassFile().getGroup(); ClassFile otherClass = group.findClass(method.getClassEntry().getName()); if (otherClass == null) ret...
#fixed code @Override public List<net.runelite.deob.Method> getMethods() { return myMethods != null ? myMethods : Arrays.asList(); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public void run(ClassGroup one, ClassGroup two) { groupOne = one; groupTwo = two; // Execution eone = new Execution(one); // eone.setBuildGraph(true); // eone.setFollowInvokes(false); // eone.populateInitialMethods(); // List<Method> initial1 = eone.getInitial...
#fixed code public void run(ClassGroup one, ClassGroup two) { groupOne = one; groupTwo = two; Execution eone = new Execution(one); eone.setBuildGraph(true); eone.setFollowInvokes(false); eone.populateInitialMethods(); List<Method> initial1 = eone.getInitialMethods().stream...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void test1() throws IOException { File file = folder.newFile(); Store store = new Store(folder.getRoot()); DataFile df = new DataFile(store, file); int sector = df.write(42, 3, ByteBuffer.wrap("test".getBytes())); byte[] buf = df.read(42, 3, sector...
#fixed code @Test public void test1() throws IOException { File file = folder.newFile(); Store store = new Store(folder.getRoot()); DataFile df = new DataFile(store, file); DataFileWriteResult res = df.write(42, 3, ByteBuffer.wrap("test".getBytes()), 0, 0); DataFileReadResult re...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void test2() throws IOException { byte[] b = new byte[1024]; for (int i = 0; i < 1024; ++i) b[i] = (byte) i; File file = folder.newFile(); Store store = new Store(); DataFile df = new DataFile(store, 42, file); int sector = df.write(0x1FFFF, B...
#fixed code @Test public void test2() throws IOException { byte[] b = new byte[1024]; for (int i = 0; i < 1024; ++i) b[i] = (byte) i; File file = folder.newFile(); Store store = new Store(folder.getRoot()); DataFile df = new DataFile(store, 42, file); int sector = df.write(...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void lookup() { ClassGroup group = this.getInstructions().getCode().getAttributes().getClassFile().getGroup(); ClassFile otherClass = group.findClass(method.getClassEntry().getName()); if (otherClass == null) return; // not our class // ...
#fixed code @Override public void lookup() { myMethods = lookupMethods(); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public List<net.runelite.deob.Method> getMethods() { ClassGroup group = this.getInstructions().getCode().getAttributes().getClassFile().getGroup(); ClassFile otherClass = group.findClass(method.getClassEntry().getName()); if (otherClass == null) ret...
#fixed code @Override public List<net.runelite.deob.Method> getMethods() { return myMethods != null ? myMethods : Arrays.asList(); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void test() throws IOException { Store store = new Store(new java.io.File("c:/rs/cache")); store.load(); } #location 5 #vulnerability type RESOURCE_LEAK
#fixed code @Test public void test() throws IOException { Store store = new Store(new java.io.File("d:/rs/07/cache"));//c:/rs/cache")); store.load(); System.out.println(store); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public void run() { for (ClassFile cf : deobfuscated.getClasses()) { Annotations an = cf.getAttributes().getAnnotations(); String obfuscatedName = cf.getName(); Annotation obfuscatedNameAnnotation = an.find(OBFUSCATED_NAME); if (obfuscatedNameAnnotation !...
#fixed code public void run() { for (ClassFile cf : deobfuscated.getClasses()) { Annotations an = cf.getAttributes().getAnnotations(); if (an == null) continue; String obfuscatedName = cf.getName(); Annotation obfuscatedNameAnnotation = an.find(OBFUSCATED_NAME); if...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code private ParallelExecutorMapping mapStaticMethods(ClassGroup one, ClassGroup two) { StaticMethodSignatureMapper smsm = new StaticMethodSignatureMapper(); smsm.map(one, two); List<ParallelExecutorMapping> pmes = new ArrayList<>(); for (Method m : smsm.getMap()...
#fixed code private ParallelExecutorMapping mapStaticMethods(ClassGroup one, ClassGroup two) { StaticMethodSignatureMapper smsm = new StaticMethodSignatureMapper(); smsm.map(one, two); List<ParallelExecutorMapping> pmes = new ArrayList<>(); for (Method m : smsm.getMap().keySe...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void run(ClassGroup group) { this.group = group; group.buildClassGraph(); execution = new Execution(group); execution.populateInitialMethods(); execution.run(); findUses(); Field f = group.findClass("class41").findField("field1170"...
#fixed code @Override public void run(ClassGroup group) { this.group = group; group.buildClassGraph(); execution = new Execution(group); execution.populateInitialMethods(); Encryption encr = new Encryption(); execution.setEncryption(encr); execution.run(); encr...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static void main(String[] args) { SocksProxy proxy1 = new Socks5(new InetSocketAddress("localhost", 1080)); proxy1.setCredentials(new UsernamePasswordCredentials("socks", "1234")); SocksProxy proxy2 = new Socks5(new InetSocketAddress("localhost", 1081)...
#fixed code public static void main(String[] args) { Socket socket = null; InputStream inputStream = null; OutputStream outputStream = null; StringBuffer response = null; byte[] buffer = new byte[2048]; int length = 0; SocksProxy proxy1 = new Socks5(new InetSo...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void run() { logger.info("Start proxy server at port:{}", bindPort); while (!stop) { try { Socket socket = serverSocket.accept(); socket = processSocketBeforeUse(socket); socket.setSoTimeout(timeout); Sessio...
#fixed code @Override public void run() { logger.info("Start proxy server at port:{}", bindPort); while (!stop) { try { Socket socket = serverSocket.accept(); socket = processSocketBeforeUse(socket); socket.setSoTimeout(timeout); Session sess...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static void main(String[] args) throws Exception { SocksClientSSLUtil sslUtil = SocksClientSSLUtil.loadClassPath("client-ssl.properties"); SocksProxy proxy = new Socks5(new InetSocketAddress("localhost", 1080)); List<SocksMethod> methods = new ArrayLi...
#fixed code public static void main(String[] args) throws Exception { SSLConfiguration configuration = SSLConfiguration.loadClassPath("client-ssl.properties"); SocksProxy proxy = new SSLSocks5(new InetSocketAddress("localhost", 1080), configuration); List<SocksMethod> met...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void run() { logger.info("Start proxy server at port:{}", bindPort); while (!stop) { try { Socket socket = serverSocket.accept(); socket = processSocketBeforeUse(socket); socket.setSoTimeout(timeout); Sessio...
#fixed code @Override public void run() { logger.info("Start proxy server at port:{}", bindPort); while (!stop) { try { Socket socket = serverSocket.accept(); socket = processSocketBeforeUse(socket); socket.setSoTimeout(timeout); Session sess...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static void main(String[] args) throws IOException { Timer.open(); SSLConfiguration configuration = SSLConfiguration.loadClassPath("server-ssl.properties"); SocksProxyServer proxyServer = new SSLSocksProxyServer(Socks5Handler.class, configuration); ...
#fixed code public static void main(String[] args) throws IOException { Timer.open(); SSLConfiguration configuration = SSLConfiguration.loadClassPath("server-ssl.properties"); SocksProxyServer proxyServer = SocksServerBuilder.buildAnonymousSSLSocks5Server(1081, configuration); ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public byte[] getBytes() { byte[] bytes = null; switch (addressType) { case AddressType.IPV4: bytes = new byte[10]; byte[] ipv4Bytes = inetAddress.getAddress();// todo System.arraycopy(ipv4Bytes, 0, bytes, 4, ipv4Bytes.le...
#fixed code @Override public byte[] getBytes() { byte[] bytes = null; switch (addressType) { case AddressType.IPV4: bytes = new byte[10]; byte[] ipv4Bytes = inetAddress.getAddress();// todo System.arraycopy(ipv4Bytes, 0, bytes, 4, ipv4Bytes.length);...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public void run() { logger.info("Start proxy server at port:{}", bindPort); while (!stop) { try { Socket socket = serverSocket.accept(); socket = processSocketBeforeUse(socket); socket.setSoTimeout(timeout); Sessio...
#fixed code @Override public void run() { logger.info("Start proxy server at port:{}", bindPort); while (!stop) { try { Socket socket = serverSocket.accept(); socket = processSocketBeforeUse(socket); socket.setSoTimeout(timeout); Session sess...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static void main(@Nullable String[] args) throws IOException, InterruptedException { Timer.open(); Socks5Server socks5Server = new Socks5Server(); socks5Server.start(args); BasicSocksProxyServer server = (BasicSocksProxyServer) socks5Server.server; ...
#fixed code public static void main(@Nullable String[] args) throws IOException, InterruptedException { Timer.open(); Socks5Server socks5Server = new Socks5Server(); socks5Server.start(args); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static void main(String[] args) { SocksProxy proxy = new Socks5(new InetSocketAddress("localhost", 1080)); try { @SuppressWarnings("resource") Socket socket = new SocksSocket(proxy, new InetSocketAddress("whois.internic.net", 43)); Inp...
#fixed code public static void main(String[] args) { InputStream inputStream = null; OutputStream outputStream = null; Socket socket = null; StringBuffer response = null; int length = 0; byte[] buffer = new byte[2048]; try { SocksProxy proxy = new Socks5...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testGetterSetterAnnotated() throws Exception { GetterSetterAnnotated o = new GetterSetterAnnotated(); o.setId("blah"); JacksonDBCollection<GetterSetterAnnotated, String> coll = createCollFor(o, String.class); WriteRe...
#fixed code @Test public void testGetterSetterAnnotated() throws Exception { GetterSetterAnnotated o = new GetterSetterAnnotated(); o.setId("blah"); JacksonDBCollection<GetterSetterAnnotated, String> coll = createCollFor(o, String.class); coll.insert(o...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void simpleDbRefShouldBeSavedAsDbRef() { JacksonDBCollection<Owner, String> coll = getCollection(Owner.class, String.class); JacksonDBCollection<Referenced, String> refColl = getCollection(Referenced.class, String.class); refCol...
#fixed code @Test public void simpleDbRefShouldBeSavedAsDbRef() { JacksonDBCollection<Owner, String> coll = getCollection(Owner.class, String.class); JacksonDBCollection<Referenced, String> refColl = getCollection(Referenced.class, String.class); refColl.inse...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void dbRefWithObjectIdShouldBeSavedAsDbRef() { JacksonDBCollection<ObjectIdOwner, String> coll = getCollection(ObjectIdOwner.class, String.class); JacksonDBCollection<ObjectIdReferenced, byte[]> refColl = getCollection(ObjectIdReferenced...
#fixed code @Test public void dbRefWithObjectIdShouldBeSavedAsDbRef() { JacksonDBCollection<ObjectIdOwner, String> coll = getCollection(ObjectIdOwner.class, String.class); JacksonDBCollection<ObjectIdReferenced, byte[]> refColl = getCollection(ObjectIdReferenced.class...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public WriteResult<T, K> update(T query, T object, boolean upsert, boolean multi, WriteConcern concern) throws MongoException { return update(convertToDbObject(query), convertToDbObject(object), upsert, multi, concern); } #locati...
#fixed code public WriteResult<T, K> update(T query, T object, boolean upsert, boolean multi, WriteConcern concern) throws MongoException { return update(convertToBasicDbObject(query), convertToBasicDbObject(object), upsert, multi, concern); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testJpaIdFieldAnnotated() throws Exception { JpaIdFieldAnnotated o = new JpaIdFieldAnnotated(); o.id = "blah"; JacksonDBCollection<JpaIdFieldAnnotated, String> coll = createCollFor(o, String.class); WriteResult<JpaId...
#fixed code @Test public void testJpaIdFieldAnnotated() throws Exception { JpaIdFieldAnnotated o = new JpaIdFieldAnnotated(); o.id = "blah"; JacksonDBCollection<JpaIdFieldAnnotated, String> coll = createCollFor(o, String.class); coll.insert(o); ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void dbRefWithObjectIdShouldBeSavedAsDbRef() { JacksonDBCollection<ObjectIdOwner, String> coll = getCollection(ObjectIdOwner.class, String.class); JacksonDBCollection<ObjectIdReferenced, byte[]> refColl = getCollection(ObjectIdReferenced...
#fixed code @Test public void dbRefWithObjectIdShouldBeSavedAsDbRef() { JacksonDBCollection<ObjectIdOwner, String> coll = getCollection(ObjectIdOwner.class, String.class); JacksonDBCollection<ObjectIdReferenced, byte[]> refColl = getCollection(ObjectIdReferenced.class...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testIdFieldAnnotated() throws Exception { IdFieldAnnotated o = new IdFieldAnnotated(); o.id = "blah"; JacksonDBCollection<IdFieldAnnotated, String> coll = createCollFor(o, String.class); WriteResult<IdFieldAnnotated,...
#fixed code @Test public void testIdFieldAnnotated() throws Exception { IdFieldAnnotated o = new IdFieldAnnotated(); o.id = "blah"; JacksonDBCollection<IdFieldAnnotated, String> coll = createCollFor(o, String.class); coll.insert(o); IdFieldAnno...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testObjectIdAnnotationOnStringGenerated() { StringId object = new StringId(); JacksonDBCollection<StringId, String> coll = getCollection(StringId.class, String.class); String id = coll.insert(object).getSavedId(); ...
#fixed code @Test public void testObjectIdAnnotationOnStringGenerated() { StringId object = new StringId(); JacksonDBCollection<StringId, String> coll = getCollection(StringId.class, String.class); coll.insert(object); String id = coll.findOne()._id;...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testCreatorGetterAnnotated() throws Exception { CreatorGetterAnnotated o = new CreatorGetterAnnotated("blah"); JacksonDBCollection<CreatorGetterAnnotated, String> coll = createCollFor(o, String.class); WriteResult<CreatorGet...
#fixed code @Test public void testCreatorGetterAnnotated() throws Exception { CreatorGetterAnnotated o = new CreatorGetterAnnotated("blah"); JacksonDBCollection<CreatorGetterAnnotated, String> coll = createCollFor(o, String.class); coll.insert(o); Crea...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testObjectIdGenerated() { ObjectIdId object = new ObjectIdId(); JacksonDBCollection<ObjectIdId, org.bson.types.ObjectId> coll = getCollection(ObjectIdId.class, org.bson.types.ObjectId.class); org.bson.types...
#fixed code @Test public void testObjectIdGenerated() { ObjectIdId object = new ObjectIdId(); JacksonDBCollection<ObjectIdId, org.bson.types.ObjectId> coll = getCollection(ObjectIdId.class, org.bson.types.ObjectId.class); coll.insert(object);...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testUsingMongoCollectionAnnotation() { JacksonDBCollection<Owner, String> coll = getCollection(Owner.class, String.class); JacksonDBCollection<Referenced, String> refColl = getCollection(Referenced.class, String.class, "referenced")...
#fixed code @Test public void testUsingMongoCollectionAnnotation() { JacksonDBCollection<Owner, String> coll = getCollection(Owner.class, String.class); JacksonDBCollection<Referenced, String> refColl = getCollection(Referenced.class, String.class, "referenced"); ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public UpdateResult save(T object, WriteConcern concern) throws MongoWriteException, MongoWriteConcernException, MongoException { Document dbObject = convertToDocument(object); Object _id = dbObject.get("_id"); if(_id == null) { this....
#fixed code public UpdateResult save(T object, WriteConcern concern) throws MongoWriteException, MongoWriteConcernException, MongoException { Object _id; @SuppressWarnings("unchecked") final Codec<T> codec = getMongoCollection().getCodecRegistry().get((Class<T>) o...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testObjectIdFieldAnnotated() throws Exception { ObjectIdFieldAnnotated o = new ObjectIdFieldAnnotated(); JacksonDBCollection<ObjectIdFieldAnnotated, String> coll = createCollFor(o, String.class); WriteResult<ObjectIdFieldAnn...
#fixed code @Test public void testObjectIdFieldAnnotated() throws Exception { ObjectIdFieldAnnotated o = new ObjectIdFieldAnnotated(); o.id = new org.bson.types.ObjectId().toString(); JacksonDBCollection<ObjectIdFieldAnnotated, String> coll = createCollFor(o, ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testObjectIdSaved() { ObjectIdId object = new ObjectIdId(); org.bson.types.ObjectId id = new org.bson.types.ObjectId(); object._id = id; JacksonDBCollection<ObjectIdId, org.bson.types.ObjectId> coll = getCollection(...
#fixed code @Test public void testObjectIdSaved() { ObjectIdId object = new ObjectIdId(); org.bson.types.ObjectId id = new org.bson.types.ObjectId(); object._id = id; JacksonDBCollection<ObjectIdId, org.bson.types.ObjectId> coll = getCollection(Object...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void collectionOfObjectIdDbRefsShouldBeSavedAsObjectIdDbRefs() { JacksonDBCollection<ObjectIdCollectionOwner, String> coll = getCollection(ObjectIdCollectionOwner.class, String.class); JacksonDBCollection<ObjectIdReferenced, byte[]> refC...
#fixed code @Test public void collectionOfObjectIdDbRefsShouldBeSavedAsObjectIdDbRefs() { JacksonDBCollection<ObjectIdCollectionOwner, String> coll = getCollection(ObjectIdCollectionOwner.class, String.class); JacksonDBCollection<ObjectIdReferenced, byte[]> refColl = ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testUsingMongoCollectionAnnotation() { JacksonDBCollection<Owner, String> coll = getCollection(Owner.class, String.class); JacksonDBCollection<Referenced, String> refColl = getCollection(Referenced.class, String.class, "referenced")...
#fixed code @Test public void testUsingMongoCollectionAnnotation() { JacksonDBCollection<Owner, String> coll = getCollection(Owner.class, String.class); JacksonDBCollection<Referenced, String> refColl = getCollection(Referenced.class, String.class, "referenced"); ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testFindOneByIdWithObjectId() { JacksonDBCollection<StringId, String> coll = getCollection(StringId.class, String.class); StringId object = new StringId(); net.vz.mongodb.jackson.WriteResult<StringId, String> writeResult = c...
#fixed code @Test public void testFindOneByIdWithObjectId() { JacksonDBCollection<StringId, String> coll = getCollection(StringId.class, String.class); StringId object = new StringId(); coll.insert(object); assertThat(coll.getDbCollection().findOne().g...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testCreatorGetterObjectIdAnnotated() throws Exception { CreatorGetterObjectIdAnnotated o = new CreatorGetterObjectIdAnnotated(null); JacksonDBCollection<CreatorGetterObjectIdAnnotated, String> coll = createCollFor(o, String.class); ...
#fixed code @Test public void testCreatorGetterObjectIdAnnotated() throws Exception { CreatorGetterObjectIdAnnotated o = new CreatorGetterObjectIdAnnotated(new org.bson.types.ObjectId().toString()); JacksonDBCollection<CreatorGetterObjectIdAnnotated, String> coll = cr...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void collectionOfObjectIdDbRefsShouldBeSavedAsObjectIdDbRefs() { JacksonDBCollection<ObjectIdCollectionOwner, String> coll = getCollection(ObjectIdCollectionOwner.class, String.class); JacksonDBCollection<ObjectIdReferenced, byte[]> refC...
#fixed code @Test public void collectionOfObjectIdDbRefsShouldBeSavedAsObjectIdDbRefs() { JacksonDBCollection<ObjectIdCollectionOwner, String> coll = getCollection(ObjectIdCollectionOwner.class, String.class); JacksonDBCollection<ObjectIdReferenced, byte[]> refColl = ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testObjectIdAnnotationOnStringSaved() { StringId object = new StringId(); String id = new org.bson.types.ObjectId().toString(); object._id = id; JacksonDBCollection<StringId, String> coll = getCollection(StringId.cl...
#fixed code @Test public void testObjectIdAnnotationOnStringSaved() { StringId object = new StringId(); String id = new org.bson.types.ObjectId().toString(); object._id = id; JacksonDBCollection<StringId, String> coll = getCollection(StringId.class, S...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void simpleDbRefShouldBeSavedAsDbRef() { JacksonDBCollection<Owner, String> coll = getCollection(Owner.class, String.class); JacksonDBCollection<Referenced, String> refColl = getCollection(Referenced.class, String.class); refCol...
#fixed code @Test public void simpleDbRefShouldBeSavedAsDbRef() { JacksonDBCollection<Owner, String> coll = getCollection(Owner.class, String.class); JacksonDBCollection<Referenced, String> refColl = getCollection(Referenced.class, String.class); refColl.inse...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code protected void calculate(ValuesProvider valuesProvider, List<ConnectionCandidate> connections, NeuralNetwork nn) { if (connections.size() > 0) { List<Connections> chunk = new ArrayList<>(); for (int i = 0; i < connections.size(); i++) { ConnectionCandidate...
#fixed code protected void calculate(ValuesProvider valuesProvider, List<ConnectionCandidate> connections, NeuralNetwork nn) { if (connections.size() > 0) { List<Connections> chunk = new ArrayList<>(); for (int i = 0; i < connections.size(); i++) { ConnectionCandidate c = c...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void httpsUrlGitHubNoSuffix() { GitHubRepositoryName repo = GitHubRepositoryName .create("https://user@github.com/jenkinsci/jenkins"); assertNotNull(repo); assertEquals("jenkinsci", repo.userName); assertE...
#fixed code @Test public void httpsUrlGitHubNoSuffix() { testURL("https://user@github.com/jenkinsci/jenkins", "github.com", "jenkinsci", "jenkins"); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void gitColonUrlGitHub() { GitHubRepositoryName repo = GitHubRepositoryName .create("git://github.com/jenkinsci/jenkins.git"); assertNotNull(repo); assertEquals("jenkinsci", repo.userName); assertEquals("j...
#fixed code @Test public void gitColonUrlGitHub() { testURL("git://github.com/jenkinsci/jenkins.git", "github.com", "jenkinsci", "jenkins"); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void httpsUrlGitHub() { GitHubRepositoryName repo = GitHubRepositoryName .create("https://user@github.com/jenkinsci/jenkins.git"); assertNotNull(repo); assertEquals("jenkinsci", repo.userName); assertEqual...
#fixed code @Test public void httpsUrlGitHub() { testURL("https://user@github.com/jenkinsci/jenkins.git", "github.com", "jenkinsci", "jenkins"); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void gitAtUrlGitHub() { GitHubRepositoryName repo = GitHubRepositoryName .create("git@github.com:jenkinsci/jenkins.git"); assertNotNull(repo); assertEquals("jenkinsci", repo.userName); assertEquals("jenkin...
#fixed code @Test public void gitAtUrlGitHub() { testURL("git@github.com:jenkinsci/jenkins.git", "github.com", "jenkinsci", "jenkins"); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void gitColonUrlOtherHostNoSuffix() { GitHubRepositoryName repo = GitHubRepositoryName .create("git://company.net/jenkinsci/jenkins"); assertNotNull(repo); assertEquals("jenkinsci", repo.userName); assertE...
#fixed code @Test public void gitColonUrlOtherHostNoSuffix() { testURL("git://company.net/jenkinsci/jenkins", "company.net", "jenkinsci", "jenkins"); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void gitColonUrlOtherHost() { GitHubRepositoryName repo = GitHubRepositoryName .create("git://company.net/jenkinsci/jenkins.git"); assertNotNull(repo); assertEquals("jenkinsci", repo.userName); assertEqual...
#fixed code @Test public void gitColonUrlOtherHost() { testURL("git://company.net/jenkinsci/jenkins.git", "company.net", "jenkinsci", "jenkins"); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void gitColonUrlGitHubNoSuffix() { GitHubRepositoryName repo = GitHubRepositoryName .create("git://github.com/jenkinsci/jenkins"); assertNotNull(repo); assertEquals("jenkinsci", repo.userName); assertEqual...
#fixed code @Test public void gitColonUrlGitHubNoSuffix() { testURL("git://github.com/jenkinsci/jenkins", "github.com", "jenkinsci", "jenkins"); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void httpsUrlGitHubWithoutUserNoSuffix() { //this is valid for anonymous usage GitHubRepositoryName repo = GitHubRepositoryName .create("https://github.com/jenkinsci/jenkins"); assertNotNull(repo); assertE...
#fixed code @Test public void httpsUrlGitHubWithoutUserNoSuffix() { testURL("https://github.com/jenkinsci/jenkins", "github.com", "jenkinsci", "jenkins"); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void trimWhitespace() { GitHubRepositoryName repo = GitHubRepositoryName .create(" https://user@github.com/jenkinsci/jenkins/ "); assertNotNull(repo); assertEquals("jenkinsci", repo.userName); ...
#fixed code @Test public void trimWhitespace() { assertThat(" https://user@github.com/jenkinsci/jenkins/ ", repo(allOf( withHost("github.com"), withUserName("jenkinsci"), withRepoName("jenkins") ))); ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void httpsUrlOtherHost() { GitHubRepositoryName repo = GitHubRepositoryName .create("https://employee@gh.company.com/jenkinsci/jenkins.git"); assertNotNull(repo); assertEquals("jenkinsci", repo.userName); ...
#fixed code @Test public void httpsUrlOtherHost() { testURL("https://employee@gh.company.com/jenkinsci/jenkins.git", "gh.company.com", "jenkinsci", "jenkins"); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void httpsUrlOtherHostNoSuffix() { GitHubRepositoryName repo = GitHubRepositoryName .create("https://employee@gh.company.com/jenkinsci/jenkins"); assertNotNull(repo); assertEquals("jenkinsci", repo.userName); ...
#fixed code @Test public void httpsUrlOtherHostNoSuffix() { testURL("https://employee@gh.company.com/jenkinsci/jenkins", "gh.company.com", "jenkinsci", "jenkins"); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void gitAtUrlOtherHostNoSuffix() { GitHubRepositoryName repo = GitHubRepositoryName .create("git@gh.company.com:jenkinsci/jenkins"); assertNotNull(repo); assertEquals("jenkinsci", repo.userName); assertEqu...
#fixed code @Test public void gitAtUrlOtherHostNoSuffix() { testURL("git@gh.company.com:jenkinsci/jenkins", "gh.company.com", "jenkinsci", "jenkins"); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void httpsUrlGitHubWithoutUser() { //this is valid for anonymous usage GitHubRepositoryName repo = GitHubRepositoryName .create("https://github.com/jenkinsci/jenkins.git"); assertNotNull(repo); assertEqual...
#fixed code @Test public void httpsUrlGitHubWithoutUser() { testURL("https://github.com/jenkinsci/jenkins.git", "github.com", "jenkinsci", "jenkins"); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code private OkHttpConnector connector(String apiUrl) { Jenkins jenkins = GitHubWebHook.getJenkinsInstance(); OkHttpClient client = new OkHttpClient().setProxy(getProxy(apiUrl)); if (configuration().getClientCacheSize() > 0) { File cacheD...
#fixed code private OkHttpConnector connector(String apiUrl) { OkHttpClient client = new OkHttpClient().setProxy(getProxy(apiUrl)); if (configuration().getClientCacheSize() > 0) { File cacheDir = getCacheBaseDirFor(GitHubWebHook.getJenkinsInstance()); ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void gitAtUrlGitHubNoSuffix() { GitHubRepositoryName repo = GitHubRepositoryName .create("git@github.com:jenkinsci/jenkins"); assertNotNull(repo); assertEquals("jenkinsci", repo.userName); assertEquals("je...
#fixed code @Test public void gitAtUrlGitHubNoSuffix() { testURL("git@github.com:jenkinsci/jenkins", "github.com", "jenkinsci", "jenkins"); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void gitAtUrlOtherHost() { GitHubRepositoryName repo = GitHubRepositoryName .create("git@gh.company.com:jenkinsci/jenkins.git"); assertNotNull(repo); assertEquals("jenkinsci", repo.userName); assertEquals(...
#fixed code @Test public void gitAtUrlOtherHost() { testURL("git@gh.company.com:jenkinsci/jenkins.git", "gh.company.com", "jenkinsci", "jenkins"); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static void main(String[] args) throws Exception { CommandLineParams commandLineParams = new CommandLineParams(); JCommander jCommander = new JCommander(commandLineParams, args); if (commandLineParams.help) { jCommander.usag...
#fixed code public static void main(String[] args) throws Exception { CommandLineParams commandLineParams = new CommandLineParams(); JCommander jCommander = new JCommander(commandLineParams, args); if (commandLineParams.help) { jCommander.usage(); ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public Process exec( String namespace, String name, String[] command, String container, boolean stdin, boolean tty) throws ApiException, IOException { if (container == null) { CoreV1Api api = new CoreV1Api(apiClient); V1Pod pod = api.readNamesp...
#fixed code public Process exec( String namespace, String name, String[] command, String container, boolean stdin, boolean tty) throws ApiException, IOException { return newExecutionBuilder(namespace, name, command) .setContainer(container) .setStdin(stdin) ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Benchmark public void fastjson() { JSONScanner scanner = new JSONScanner(JsoniterBenchmarkState.inputString); scanner.nextToken(); do { scanner.nextToken(); scanner.intValue(); scanner.nextToken(); ...
#fixed code @Benchmark public void fastjson() { JSON.parseObject(JsoniterBenchmarkState.inputString, byte[].class); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static ApiClient defaultClient() throws IOException { String kubeConfig = System.getenv(ENV_KUBECONFIG); if (kubeConfig != null) { return fromConfig(new FileReader(kubeConfig)); } File config = new File( new...
#fixed code public static ApiClient defaultClient() throws IOException { return ClientBuilder.defaults().build(); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Benchmark public void fastjson() { new JSONReaderScanner(new InputStreamReader(new ByteArrayInputStream(JsoniterBenchmarkState.input))).intValue(); } #location 3 #vulnerability type RESOURCE_LEAK
#fixed code @Benchmark public void fastjson() { JSONScanner scanner = new JSONScanner(JsoniterBenchmarkState.inputString); scanner.nextToken(); do { scanner.nextToken(); scanner.intValue(); scanner.nextToken(); } whi...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public Process exec( String namespace, String name, String[] command, String container, boolean stdin, boolean tty) throws ApiException, IOException { if (container == null) { CoreV1Api api = new CoreV1Api(apiClient); V1Pod pod = api.readNamesp...
#fixed code public Process exec( String namespace, String name, String[] command, String container, boolean stdin, boolean tty) throws ApiException, IOException { return newExecutionBuilder(namespace, name, command) .setContainer(container) .setStdin(stdin) ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Benchmark public void jsoniter() throws IOException { Jsoniter iter = Jsoniter.parseBytes(JsoniterBenchmarkState.inputBytes); while (iter.ReadArray()) { iter.ReadUnsignedInt(); } } #location 6 ...
#fixed code @Benchmark public void jsoniter() throws IOException { Jsoniter jsoniter = Jsoniter.parseBytes(JsoniterBenchmarkState.inputBytes); byte[] val = new byte[3]; jsoniter.Read(val); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static ApiClient fromConfig(InputStream stream) throws IOException { return fromConfig(new InputStreamReader(stream)); // TODO UTF-8 } #location 2 #vulnerability type RESOURCE_LEAK
#fixed code public static ApiClient fromConfig(InputStream stream) throws IOException { return fromConfig(new InputStreamReader(stream, StandardCharsets.UTF_8.name())); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public <T extends Message> ObjectOrStatus<T> request( T.Builder builder, String path, String method, T body, String apiVersion, String kind) throws ApiException, IOException { HashMap<String, String> headers = new HashMap<>(); headers.put("Content-Type...
#fixed code public <T extends Message> ObjectOrStatus<T> request( T.Builder builder, String path, String method, T body, String apiVersion, String kind) throws ApiException, IOException { HashMap<String, String> headers = new HashMap<>(); headers.put("Content-Type", MED...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static ApiClient fromConfig(String fileName) throws IOException { return fromConfig(new FileReader(fileName)); } #location 2 #vulnerability type RESOURCE_LEAK
#fixed code public static ApiClient fromConfig(String fileName) throws IOException { KubeConfig config = KubeConfig.loadKubeConfig(new FileReader(fileName)); // TODO UTF-8 config.setFile(new File(fileName)); return fromConfig(config); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static ClientBuilder standard(boolean persistConfig) throws IOException { final File kubeConfig = findConfigFromEnv(); if (kubeConfig != null) { try (BufferedReader kubeConfigReader = new BufferedReader( new InputStreamReader( ...
#fixed code public static ClientBuilder standard(boolean persistConfig) throws IOException { final File kubeConfig = findConfigFromEnv(); ClientBuilder clientBuilderEnv = getClientBuilder(persistConfig, kubeConfig); if (clientBuilderEnv != null) return clientBuilderEnv; fin...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static void main(String[] args) throws IOException, ApiException { ApiClient client = Config.defaultClient(); Configuration.setDefaultApiClient(client); CoreV1Api api = new CoreV1Api(); V1PodList list = api.listPodForAllNamespaces(null, nul...
#fixed code public static void main(String[] args) { try { Example operation = new Example(); operation.executeCommand(); } catch (ApiException ex) { LOGGER.log(Level.SEVERE, null, ex); } }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code private ApiListType executeRequest(Call call) throws IOException, ApiException, ObjectMetaReflectException { ApiListType data = client.handleResponse(call.execute(), listType); V1ListMeta listMetaData = Reflect.listMetadata(data); continueToken = listMet...
#fixed code private ApiListType executeRequest(Call call) throws IOException, ApiException { return client.handleResponse(call.execute(), listType); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Benchmark public void jsoniter() throws IOException { Jsoniter.parse(new ByteArrayInputStream(JsoniterBenchmarkState.input), 4096).ReadUnsignedInt(); } #location 3 #vulnerability type RESOURCE_LE...
#fixed code @Benchmark public void jsoniter() throws IOException { Jsoniter iter = Jsoniter.parseBytes(JsoniterBenchmarkState.inputBytes); while (iter.ReadArray()) { iter.ReadUnsignedInt(); } }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public void writeToStream(DataOutputStream os) throws IOException { WritableByteChannel dataChannel = Channels.newChannel(os); os.writeInt(getOriginalSize()); os.writeInt(getSamplingRateSA()); os.writeInt(getSamplingRateISA()); os.writeInt(getSampling...
#fixed code public void writeToStream(DataOutputStream os) throws IOException { WritableByteChannel dataChannel = Channels.newChannel(os); os.writeInt(getOriginalSize()); os.writeInt(getSamplingRateSA()); os.writeInt(getSamplingRateISA()); os.writeInt(getSamplingRateNP...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static void main(String[] args) throws IOException { if (args.length < 2 || args.length > 3) { System.err.println("Parameters: [input-path] [output-path] <[type]>"); System.exit(-1); } File file = new File(args[0]); if (file.length() > ...
#fixed code public static void main(String[] args) throws IOException { if (args.length < 2 || args.length > 3) { System.err.println("Parameters: [input-path] [output-path] <[file-type]>"); System.exit(-1); } File file = new File(args[0]); if (file.length() > 1...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public void setUp() throws Exception { super.setUp(); instance = new QSufSort(); File file = new File("data/test_file"); byte[] data = new byte[(int) file.length()]; try { new FileInputStream(file).read(data); ...
#fixed code public void setUp() throws Exception { super.setUp(); instance = new QSufSort(); File inputFile = new File("data/test_file"); byte[] fileData = new byte[(int) inputFile.length()]; DataInputStream dis = new DataInputStream( ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public void readFromFile(String path) throws IOException { FileInputStream fis = new FileInputStream(path); DataInputStream is = new DataInputStream(fis); readFromStream(is); } #location 4 #vulnerabil...
#fixed code public void readFromFile(String path) throws IOException { readCoreFromFile(path); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static void main(String[] args) throws IOException { if(args.length != 1) { System.err.println("Paramters: [input-path]"); System.exit(-1); } File file = new File(args[0]); if(file.length() > 1L<<31) { ...
#fixed code public static void main(String[] args) throws IOException { if(args.length != 1) { System.err.println("Paramters: [input-path]"); System.exit(-1); } SuccinctFileBuffer succinctFileBuffer; if(args[0].endsWith(".succinct...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code private List<StorageState> decode(byte[] bs, Charset charset) throws IOException { // 获取对象转换定义 ObjectMateData objectMateData = FdfsParamMapper.getObjectMap(StorageState.class); int fixFieldsTotalSize = objectMateData.getFieldsFixTotalSize(); ...
#fixed code private List<StorageState> decode(byte[] bs, Charset charset) throws IOException { // 获取对象转换定义 ObjectMataData objectMataData = FdfsParamMapper.getObjectMap(StorageState.class); int fixFieldsTotalSize = objectMataData.getFieldsFixTotalSize(); if...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code private List<GroupState> decode(byte[] bs, Charset charset) throws IOException { // 获取对象转换定义 ObjectMataData objectMataData = FdfsParamMapper.getObjectMap(GroupState.class); int fixFieldsTotalSize = objectMataData.getFieldsFixTotalSize(); ...
#fixed code private List<GroupState> decode(byte[] bs, Charset charset) throws IOException { // 获取对象转换定义 ObjectMetaData objectMetaData = FdfsParamMapper.getObjectMap(GroupState.class); int fixFieldsTotalSize = objectMetaData.getFieldsFixTotalSize(); if (bs...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code protected long getBodyLength(Charset charset) { ObjectMateData objectMateData = FdfsParamMapper.getObjectMap(this.getClass()); return objectMateData.getFieldsSendTotalByteSize(this, charset) + getFileSize(); } #location 3...
#fixed code protected long getBodyLength(Charset charset) { ObjectMataData objectMataData = FdfsParamMapper.getObjectMap(this.getClass()); return objectMataData.getFieldsSendTotalByteSize(this, charset) + getFileSize(); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code protected long getBodyLength(Charset charset) { ObjectMataData objectMataData = FdfsParamMapper.getObjectMap(this.getClass()); return objectMataData.getFieldsSendTotalByteSize(this, charset) + getFileSize(); } #location 3...
#fixed code protected long getBodyLength(Charset charset) { ObjectMetaData objectMetaData = FdfsParamMapper.getObjectMap(this.getClass()); return objectMetaData.getFieldsSendTotalByteSize(this, charset) + getFileSize(); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public void service() { int i = 0; try { serverSocket = new ServerSocket(port); } catch (IOException e1) { e1.printStackTrace(); } while (true) { Socket socket = null; try { ...
#fixed code public void service() { int i = 0; try { serverSocket = new ServerSocket(port); } catch (BindException e) { LOGGER.error("端口绑定错误", e.getCause()); throw new RuntimeException("端口已经被绑定"); } catch (IOException e1...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testConnectionManager() { // 初始化 TrackerConnectionManager manager = new TrackerConnectionManager(createPool()); manager.setTrackerList(trackerIpList); manager.initTracker(); List<GroupState> list = null; ...
#fixed code @Test public void testConnectionManager() { // 初始化 TrackerConnectionManager manager = crtInvalidateIpListManager(); List<GroupState> list = null; // 第一次执行 try { // 连接失败 list = manager.executeFdfsTrackerCmd(ne...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public void testCheck() { // 创建连接测试 Connection conn = createConnection(); System.out.println("当前连接状态" + conn.isValid()); conn.close(); } #location 5 #vulnerability type RESOURC...
#fixed code public void testCheck() { // 创建连接测试 Connection conn = createConnection(); LOGGER.debug("当前连接状态={}", conn.isValid()); conn.close(); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code private List<StorageState> decode(byte[] bs, Charset charset) throws IOException { // 获取对象转换定义 ObjectMataData objectMataData = FdfsParamMapper.getObjectMap(StorageState.class); int fixFieldsTotalSize = objectMataData.getFieldsFixTotalSize(); ...
#fixed code private List<StorageState> decode(byte[] bs, Charset charset) throws IOException { // 获取对象转换定义 ObjectMetaData objectMetaData = FdfsParamMapper.getObjectMap(StorageState.class); int fixFieldsTotalSize = objectMetaData.getFieldsFixTotalSize(); if...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testConnectionManager() { // 初始化 TrackerConnectionManager manager = new TrackerConnectionManager(createPool()); manager.setTrackerList(trackerIpList); manager.initTracker(); List<GroupState> list = null; ...
#fixed code @Test public void testConnectionManager() { // 初始化 TrackerConnectionManager manager = crtInvalidateIpListManager(); List<GroupState> list = null; // 第一次执行 try { // 连接失败 list = manager.executeFdfsTrackerCmd(ne...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code private List<GroupState> decode(byte[] bs, Charset charset) throws IOException { // 获取对象转换定义 ObjectMateData objectMateData = FdfsParamMapper.getObjectMap(GroupState.class); int fixFieldsTotalSize = objectMateData.getFieldsFixTotalSize(); ...
#fixed code private List<GroupState> decode(byte[] bs, Charset charset) throws IOException { // 获取对象转换定义 ObjectMataData objectMataData = FdfsParamMapper.getObjectMap(GroupState.class); int fixFieldsTotalSize = objectMataData.getFieldsFixTotalSize(); if (bs...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Test public void testImaging144() throws Exception { tiffOutputSet.setGPSInDegrees(1.0, 1.0); TiffOutputDirectory gpsDirectory = tiffOutputSet.getGPSDirectory(); TiffOutputField gpsVersionId = getGpsVersionId(gpsDirectory); ...
#fixed code @Test public void testImaging144() throws Exception { tiffOutputSet.setGPSInDegrees(1.0, 1.0); TiffOutputDirectory gpsDirectory = tiffOutputSet.getGPSDirectory(); TiffOutputField gpsVersionId = gpsDirectory.findField(GpsTagConstants.GPS_TAG_GPS_VE...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code protected List<IptcBlock> parseAllBlocks(byte bytes[], boolean verbose, boolean strict) throws ImageReadException, IOException { List<IptcBlock> blocks = new ArrayList<IptcBlock>(); BinaryInputStream bis = new BinaryInputStream(bytes, APP13_...
#fixed code protected List<IptcBlock> parseAllBlocks(byte bytes[], boolean verbose, boolean strict) throws ImageReadException, IOException { List<IptcBlock> blocks = new ArrayList<IptcBlock>(); BinaryInputStream bis = null; try { bis = new...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public void dump() { dump(new PrintWriter(new OutputStreamWriter(System.out))); } #location 3 #vulnerability type RESOURCE_LEAK
#fixed code public void dump() { PrintWriter pw = new PrintWriter(System.out); dump(pw); pw.flush(); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public final byte[] deflate(byte bytes[]) throws IOException { ByteArrayInputStream in = new ByteArrayInputStream(bytes); DeflaterInputStream zIn = new DeflaterInputStream(in); return getStreamBytes(zIn); } #location 5 ...
#fixed code public final byte[] deflate(byte bytes[]) throws IOException { ByteArrayOutputStream baos = new ByteArrayOutputStream(); DeflaterOutputStream dos = new DeflaterOutputStream(baos); dos.write(bytes); dos.flush(); return baos.toByteArray(); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public final void debugNumber(String msg, int data, int bytes) { debugNumber(new PrintWriter(new OutputStreamWriter(System.out)), msg, data, bytes); } #location 3 #vulnerability type RESOURCE_LEAK
#fixed code public final void debugNumber(String msg, int data, int bytes) { PrintWriter pw = new PrintWriter(System.out); debugNumber(pw, msg, data, bytes); pw.flush(); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public byte[] compress(byte bytes[]) throws IOException { MyByteArrayOutputStream baos = new MyByteArrayOutputStream( bytes.length * 2); // max length 1 extra byte for every 128 int ptr = 0; int count = 0; while (ptr < by...
#fixed code public byte[] compress(byte bytes[]) throws IOException { MyByteArrayOutputStream baos = null; try { baos = new MyByteArrayOutputStream( bytes.length * 2); // max length 1 extra byte for every 128 int ptr = 0; ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public static byte[] decompressModifiedHuffman(final byte[] compressed, final int width, final int height) throws ImageReadException { final BitInputStreamFlexible inputStream = new BitInputStreamFlexible( new ByteArrayInputStream(com...
#fixed code public static byte[] decompressModifiedHuffman(final byte[] compressed, final int width, final int height) throws ImageReadException { try (ByteArrayInputStream baos = new ByteArrayInputStream(compressed); BitInputStreamFlexible inputStream...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code @Override public byte[] getAll() throws IOException { final ByteArrayOutputStream baos = new ByteArrayOutputStream(); InputStream is = null; boolean canThrow = false; try { is = new FileInputStream(file); is =...
#fixed code @Override public byte[] getAll() throws IOException { final ByteArrayOutputStream baos = new ByteArrayOutputStream(); try (FileInputStream fis = new FileInputStream(file); InputStream is = new BufferedInputStream(fis)) { final ...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public void removeExifMetadata(final File jpegImageFile, final File dst) throws IOException, ImageReadException, ImageWriteException { OutputStream os = null; boolean canThrow = false; try { os = new FileOutputStream(dst);...
#fixed code public void removeExifMetadata(final File jpegImageFile, final File dst) throws IOException, ImageReadException, ImageWriteException { try (FileOutputStream fos = new FileOutputStream(dst); OutputStream os = new BufferedOutputStream(fos)) {...
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public void dump() { dump(new PrintWriter(new OutputStreamWriter(System.out))); } #location 3 #vulnerability type RESOURCE_LEAK
#fixed code public void dump() { PrintWriter pw = new PrintWriter(System.out); dump(pw); pw.flush(); }
Below is the vulnerable code, please generate the patch based on the following information.
#vulnerable code public void writeImage(BufferedImage src, OutputStream os, Map params) throws ImageWriteException, IOException { // make copy of params; we'll clear keys as we consume them. params = (params == null) ? new HashMap() : new HashMap(params);...
#fixed code public void writeImage(BufferedImage src, OutputStream os, Map params) throws ImageWriteException, IOException { // make copy of params; we'll clear keys as we consume them. params = (params == null) ? new HashMap() : new HashMap(params); ...
Below is the vulnerable code, please generate the patch based on the following information.