Dataset Preview
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed
Error code: DatasetGenerationError
Exception: CastError
Message: Couldn't cast
project: string
commit_id: string
target: int64
func: string
cwe: string
big_vul_idx: int64
idx: int64
hash: double
size: int64
message: string
to
{'project': Value('string'), 'commit_id': Value('string'), 'target': Value('int64'), 'func': Value('string'), 'cwe': Value('string'), 'big_vul_idx': Value('int64'), 'idx': Value('int64'), 'hash': Value('float64')}
because column names don't match
Traceback: Traceback (most recent call last):
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1872, in _prepare_split_single
for key, table in generator:
^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/packaged_modules/json/json.py", line 295, in _generate_tables
self._cast_table(pa_table, json_field_paths=json_field_paths),
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/packaged_modules/json/json.py", line 128, in _cast_table
pa_table = table_cast(pa_table, self.info.features.arrow_schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2281, in table_cast
return cast_table_to_schema(table, schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2227, in cast_table_to_schema
raise CastError(
datasets.table.CastError: Couldn't cast
project: string
commit_id: string
target: int64
func: string
cwe: string
big_vul_idx: int64
idx: int64
hash: double
size: int64
message: string
to
{'project': Value('string'), 'commit_id': Value('string'), 'target': Value('int64'), 'func': Value('string'), 'cwe': Value('string'), 'big_vul_idx': Value('int64'), 'idx': Value('int64'), 'hash': Value('float64')}
because column names don't match
The above exception was the direct cause of the following exception:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1347, in compute_config_parquet_and_info_response
parquet_operations = convert_to_parquet(builder)
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 980, in convert_to_parquet
builder.download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 884, in download_and_prepare
self._download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 947, in _download_and_prepare
self._prepare_split(split_generator, **prepare_split_kwargs)
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1739, in _prepare_split
for job_id, done, content in self._prepare_split_single(
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1925, in _prepare_split_single
raise DatasetGenerationError("An error occurred while generating the dataset") from e
datasets.exceptions.DatasetGenerationError: An error occurred while generating the datasetNeed help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
project string | commit_id string | target int64 | func string | cwe string | big_vul_idx int64 | idx int64 | hash float64 |
|---|---|---|---|---|---|---|---|
openssl | ca989269a2876bae79393bd54c3e72d49975fc75 | 1 | long ssl_get_algorithm2(SSL *s)
{
long alg2 = s->s3->tmp.new_cipher->algorithm2;
if (TLS1_get_version(s) >= TLS1_2_VERSION &&
alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF))
return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;
return alg2;
}
| CWE-310 | 177,739 | 0 | 255,087,747,659,226,950,000,000,000,000,000,000,000 |
savannah | 190cef6eed37d0e73a73c1e205eb31d45ab60a3c | 1 | gnutls_session_get_data (gnutls_session_t session,
void *session_data, size_t * session_data_size)
{
gnutls_datum_t psession;
int ret;
if (session->internals.resumable == RESUME_FALSE)
return GNUTLS_E_INVALID_SESSION;
psession.data = session_data;
ret = _gnutls_session_pack (s... | CWE-119 | 177,741 | 1 | 266,005,388,725,654,380,000,000,000,000,000,000,000 |
savannah | e82ef4545e9e98cbcb032f55d7c750b81e3a0450 | 1 | gnutls_session_get_data (gnutls_session_t session,
void *session_data, size_t * session_data_size)
{
gnutls_datum_t psession;
int ret;
if (session->internals.resumable == RESUME_FALSE)
return GNUTLS_E_INVALID_SESSION;
psession.data = session_data;
ret = _gnutls_session_pack (s... | CWE-119 | 177,742 | 2 | 162,619,476,999,663,410,000,000,000,000,000,000,000 |
savannah | 075d7556964f5a871a73c22ac4b69f5361295099 | 1 | getftp (struct url *u, wgint passed_expected_bytes, wgint *qtyread,
wgint restval, ccon *con, int count, wgint *last_expected_bytes,
FILE *warc_tmp)
{
int csock, dtsock, local_sock, res;
uerr_t err = RETROK; /* appease the compiler */
FILE *fp;
char *respline, *tms;
const char *user... | CWE-200 | 177,746 | 3 | 114,753,069,609,161,100,000,000,000,000,000,000,000 |
savannah | 8794e8d229dc9fe29ea31424883433d4880ef408 | 1 | bgp_attr_unknown (struct bgp_attr_parser_args *args)
{
bgp_size_t total;
struct transit *transit;
struct attr_extra *attre;
struct peer *const peer = args->peer;
struct attr *const attr = args->attr;
u_char *const startp = args->startp;
const u_char type = args->type;
const u_char flag = args->fla... | 177,747 | 4 | 330,723,812,404,048,520,000,000,000,000,000,000,000 | |
ghostscript | 83d4dae44c71816c084a635550acc1a51529b881 | 1 | void fz_init_cached_color_converter(fz_context *ctx, fz_color_converter *cc, fz_colorspace *is, fz_colorspace *ds, fz_colorspace *ss, const fz_color_params *params)
{
int n = ss->n;
fz_cached_color_converter *cached = fz_malloc_struct(ctx, fz_cached_color_converter);
cc->opaque = cached;
cc->convert = fz_cached_co... | CWE-20 | 177,748 | 5 | 183,139,468,890,710,870,000,000,000,000,000,000,000 |
ghostscript | f597300439e62f5e921f0d7b1e880b5c1a1f1607 | 1 | add_range(fz_context *ctx, pdf_cmap *cmap, unsigned int low, unsigned int high, unsigned int out, int check_for_overlap, int many)
{
int current;
cmap_splay *tree;
if (low > high)
{
fz_warn(ctx, "range limits out of range in cmap %s", cmap->cmap_name);
return;
}
tree = cmap->tree;
if (cmap->tlen)
{
uns... | CWE-416 | 177,749 | 6 | 73,361,849,657,881,460,000,000,000,000,000,000,000 |
ghostscript | 4dcc6affe04368461310a21238f7e1871a752a05 | 1 | begin_softmask(fz_context *ctx, pdf_run_processor *pr, softmask_save *save)
{
pdf_gstate *gstate = pr->gstate + pr->gtop;
pdf_xobject *softmask = gstate->softmask;
fz_rect mask_bbox;
fz_matrix tos_save[2], save_ctm;
fz_matrix mask_matrix;
fz_colorspace *mask_colorspace;
save->softmask = softmask;
if (softmask ... | CWE-416 | 177,750 | 7 | 213,010,027,523,017,900,000,000,000,000,000,000,000 |
ghostscript | 71ceebcf56e682504da22c4035b39a2d451e8ffd | 1 | add_range(fz_context *ctx, pdf_cmap *cmap, unsigned int low, unsigned int high, unsigned int out, int check_for_overlap, int many)
{
int current;
cmap_splay *tree;
if (low > high)
{
fz_warn(ctx, "range limits out of range in cmap %s", cmap->cmap_name);
return;
}
tree = cmap->tree;
if (cmap->tlen)
{
uns... | CWE-416 | 177,751 | 8 | 72,963,719,227,623,510,000,000,000,000,000,000,000 |
ghostscript | b2e7d38e845c7d4922d05e6e41f3a2dc1bc1b14a | 1 | pdf_show_image(fz_context *ctx, pdf_run_processor *pr, fz_image *image)
{
pdf_gstate *gstate = pr->gstate + pr->gtop;
fz_matrix image_ctm;
fz_rect bbox;
softmask_save softmask = { NULL };
if (pr->super.hidden)
return;
break;
case PDF_MAT_SHADE:
if (gsta... | CWE-20 | 177,752 | 9 | 327,424,409,628,836,470,000,000,000,000,000,000,000 |
savannah | c15c42ccd1e2377945fd0414eca1a49294bff454 | 1 | sparse_dump_region (struct tar_sparse_file *file, size_t i)
{
union block *blk;
off_t bytes_left = file->stat_info->sparse_map[i].numbytes;
if (!lseek_or_error (file, file->stat_info->sparse_map[i].offset))
return false;
while (bytes_left > 0)
{
size_t bufsize = (bytes_left > BLOCKSIZE) ? BLOCKS... | CWE-835 | 177,768 | 23 | 265,039,722,963,046,430,000,000,000,000,000,000,000 |
samba | 5509597decdbd7b91994210f700329d8a35e70a1 | 1 | int recv_files(int f_in, int f_out, char *local_name)
{
int fd1,fd2;
STRUCT_STAT st;
int iflags, xlen;
char *fname, fbuf[MAXPATHLEN];
char xname[MAXPATHLEN];
char fnametmp[MAXPATHLEN];
char *fnamecmp, *partialptr;
char fnamecmpbuf[MAXPATHLEN];
uchar fnamecmp_type;
struct file_struct *file;
int itemizing = am... | 177,769 | 24 | 212,170,282,409,395,440,000,000,000,000,000,000,000 | |
samba | 70aeb5fddd1b2f8e143276f8d5a085db16c593b9 | 1 | int read_ndx_and_attrs(int f_in, int f_out, int *iflag_ptr, uchar *type_ptr,
char *buf, int *len_ptr)
{
int len, iflags = 0;
struct file_list *flist;
uchar fnamecmp_type = FNAMECMP_FNAME;
int ndx;
read_loop:
while (1) {
ndx = read_ndx(f_in);
if (ndx >= 0)
break;
if (ndx == NDX_DONE)
return... | 177,770 | 25 | 218,007,185,182,567,170,000,000,000,000,000,000,000 | |
haproxy | 58df5aea0a0c926b2238f65908f5e9f83d1cca25 | 1 | int dns_read_name(unsigned char *buffer, unsigned char *bufend,
unsigned char *name, char *destination, int dest_len,
int *offset)
{
int nb_bytes = 0, n = 0;
int label_len;
unsigned char *reader = name;
char *dest = destination;
while (1) {
/* Name compression ... | CWE-835 | 177,771 | 26 | 6,381,338,430,754,951,000,000,000,000,000,000,000 |
poppler | 284a92899602daa4a7f429e61849e794569310b5 | 1 | void SplashOutputDev::drawImage(GfxState *state, Object *ref, Stream *str,
int width, int height,
GfxImageColorMap *colorMap,
int *maskColors, GBool inlineImg) {
double *ctm;
SplashCoord mat[6];
SplashOutImageData imgData;
SplashColorMode srcMode;
SplashImageSource src;
GfxGray gray;
GfxRGB rg... | CWE-189 | 177,774 | 27 | 304,076,538,021,281,750,000,000,000,000,000,000,000 |
poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | 1 | void ArthurOutputDev::drawImage(GfxState *state, Object *ref, Stream *str,
int width, int height,
GfxImageColorMap *colorMap,
int *maskColors, GBool inlineImg)
{
unsigned char *buffer;
unsigned int *dest;
int x, y;
ImageStream *imgStr;
Guchar *pix;
int i;
double *ctm;
QMatrix matrix;
int... | CWE-189 | 177,775 | 28 | 145,223,011,821,523,000,000,000,000,000,000,000,000 |
shibboleth | b66cceb0e992c351ad5e2c665229ede82f261b16 | 1 | DynamicMetadataProvider::DynamicMetadataProvider(const DOMElement* e)
: saml2md::DynamicMetadataProvider(e),
m_verifyHost(XMLHelper::getAttrBool(e, true, verifyHost)),
m_ignoreTransport(XMLHelper::getAttrBool(e, false, ignoreTransport)),
m_encoded(true), m_trust(nullptr)
{
const DOME... | CWE-347 | 177,795 | 40 | 11,538,925,675,754,480,000,000,000,000,000,000,000 |
pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | 1 | static int nfs_readlink_req(struct nfs_priv *npriv, struct nfs_fh *fh,
char **target)
{
uint32_t data[1024];
uint32_t *p;
uint32_t len;
struct packet *nfs_packet;
/*
* struct READLINK3args {
* nfs_fh3 symlink;
* };
*
* struct READLINK3resok {
* post_op_attr symlink_attributes;
* nfspath3 d... | CWE-119 | 177,796 | 41 | 165,064,796,667,373,420,000,000,000,000,000,000,000 |
pengutronix | 84986ca024462058574432b5483f4bf9136c538d | 1 | static int nfs_readlink_reply(unsigned char *pkt, unsigned len)
{
uint32_t *data;
char *path;
int rlen;
int ret;
ret = rpc_check_reply(pkt, 1);
if (ret)
return ret;
data = (uint32_t *)(pkt + sizeof(struct rpc_reply));
data++;
rlen = ntohl(net_read_uint32(data)); /* new path length */
data++;
... | CWE-119 | 177,797 | 42 | 197,742,048,742,816,700,000,000,000,000,000,000,000 |
ghostscript | aeea342904978c9fe17d85f4906a0f6fcce2d315 | 1 | restore_page_device(i_ctx_t *i_ctx_p, const gs_gstate * pgs_old, const gs_gstate * pgs_new)
{
gx_device *dev_old = gs_currentdevice(pgs_old);
gx_device *dev_new;
gx_device *dev_t1;
gx_device *dev_t2;
bool samepagedevice = obj_eq(dev_old->memory, &gs_int_gstate(pgs_old)->pagedevice,
&gs_int_g... | 177,809 | 51 | 155,252,896,948,184,640,000,000,000,000,000,000,000 | |
ghostscript | 661e8d8fb8248c38d67958beda32f3a5876d0c3f | 1 | zsetdevice(i_ctx_t *i_ctx_p)
{
gx_device *dev = gs_currentdevice(igs);
os_ptr op = osp;
int code = 0;
check_write_type(*op, t_device);
if (dev->LockSafetyParams) { /* do additional checking if locked */
if(op->value.pdevice != dev) /* don't allow a different device */
... | 177,810 | 52 | 340,004,772,641,014,280,000,000,000,000,000,000,000 | |
savannah | 7a42b78be9a4108d98833069a88e6fddb9285008 | 1 | aspath_put (struct stream *s, struct aspath *as, int use32bit )
{
struct assegment *seg = as->segments;
size_t bytes = 0;
if (!seg || seg->length == 0)
return 0;
if (seg)
{
/*
* Hey, what do we do when we have > STREAM_WRITABLE(s) here?
* At the moment, we would write out a par... | CWE-20 | 177,811 | 53 | 180,268,846,652,331,300,000,000,000,000,000,000,000 |
samba | c252546ceeb0925eb8a4061315e3ff0a8c55b48b | 1 | void sum_update(const char *p, int32 len)
{
switch (cursum_type) {
case CSUM_MD5:
md5_update(&md, (uchar *)p, len);
break;
case CSUM_MD4:
case CSUM_MD4_OLD:
case CSUM_MD4_BUSTED:
if (len + sumresidue < CSUM_CHUNK) {
memcpy(md.buffer + sumresi... | CWE-354 | 177,812 | 54 | 337,655,106,013,087,120,000,000,000,000,000,000,000 |
samba | 9a480deec4d20277d8e20bc55515ef0640ca1e55 | 1 | char *auth_server(int f_in, int f_out, int module, const char *host,
const char *addr, const char *leader)
{
char *users = lp_auth_users(module);
char challenge[MAX_DIGEST_LEN*2];
char line[BIGPATHBUFLEN];
char **auth_uid_groups = NULL;
int auth_uid_groups_cnt = -1;
const char *err = NULL;
int group_match = ... | CWE-354 | 177,813 | 55 | 98,721,516,615,150,790,000,000,000,000,000,000,000 |
busybox | 0402cb32df015d9372578e3db27db47b33d5c7b0 | 1 | static int get_next_block(bunzip_data *bd)
{
struct group_data *hufGroup;
int dbufCount, dbufSize, groupCount, *base, *limit, selector,
i, j, runPos, symCount, symTotal, nSelectors, byteCount[256];
int runCnt = runCnt; /* for compiler */
uint8_t uc, symToByte[256], mtfSymbol[256], *selectors;
uint32_t *dbuf... | CWE-190 | 177,822 | 62 | 238,413,816,495,536,860,000,000,000,000,000,000,000 |
libxfont | d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | 1 | BufCompressedFill (BufFilePtr f)
{
CompressedFile *file;
register char_type *stackp, *de_stack;
register char_type finchar;
register code_int code, oldcode, incode;
BufChar *buf, *bufend;
file = (CompressedFile *) f->private;
buf = f->buffer;
bufend = buf + BUFFILESIZE;
stackp... | CWE-119 | 177,823 | 63 | 314,816,336,443,270,980,000,000,000,000,000,000,000 |
musl | 45ca5d3fcb6f874bf5ba55d0e9651cef68515395 | 1 | static int dns_parse_callback(void *c, int rr, const void *data, int len, const void *packet)
{
char tmp[256];
struct dpc_ctx *ctx = c;
switch (rr) {
case RR_A:
if (len != 4) return -1;
ctx->addrs[ctx->cnt].scopeid = 0;
memcpy(ctx->addrs[ctx->cnt++].addr, data, 4);
break;
case RR_AAAA:
if (len != 1... | CWE-119 | 177,824 | 64 | 212,099,417,602,244,200,000,000,000,000,000,000,000 |
poppler | 61f79b8447c3ac8ab5a26e79e0c28053ffdccf75 | 1 | bool extractPages (const char *srcFileName, const char *destFileName) {
char pathName[4096];
GooString *gfileName = new GooString (srcFileName);
PDFDoc *doc = new PDFDoc (gfileName, NULL, NULL, NULL);
if (!doc->isOk()) {
error(errSyntaxError, -1, "Could not extract page(s) from damaged file ('{0:s}')", src... | CWE-20 | 177,825 | 65 | 41,887,122,719,404,520,000,000,000,000,000,000,000 |
poppler | b8682d868ddf7f741e93b791588af0932893f95c | 1 | bool extractPages (const char *srcFileName, const char *destFileName) {
char pathName[1024];
GooString *gfileName = new GooString (srcFileName);
PDFDoc *doc = new PDFDoc (gfileName, NULL, NULL, NULL);
if (!doc->isOk()) {
error(errSyntaxError, -1, "Could not extract page(s) from damaged file ('{0:s}')",... | CWE-119 | 177,826 | 66 | 244,634,780,333,143,600,000,000,000,000,000,000,000 |
ghostscript | 97096297d409ec6f206298444ba00719607e8ba8 | 1 | walk_string(fz_context *ctx, int uni, int remove, editable_str *str)
{
int rune;
if (str->utf8 == NULL)
return;
do
{
char *s = &str->utf8[str->pos];
size_t len;
int n = fz_chartorune(&rune, s);
if (rune == uni)
{
/* Match. Skip over that one. */
str->pos += n... | CWE-125 | 177,832 | 70 | 260,933,823,413,348,400,000,000,000,000,000,000,000 |
spice | 53488f0275d6c8a121af49f7ac817d09ce68090d | 1 | void red_channel_pipes_add_empty_msg(RedChannel *channel, int msg_type)
{
RingItem *link;
RING_FOREACH(link, &channel->clients) {
red_channel_client_pipe_add_empty_msg(
SPICE_CONTAINEROF(link, RedChannelClient, channel_link),
msg_type);
}
}
| CWE-399 | 177,835 | 71 | 246,859,488,383,496,600,000,000,000,000,000,000,000 |
spice | 53488f0275d6c8a121af49f7ac817d09ce68090d | 1 | void red_channel_pipes_add_type(RedChannel *channel, int pipe_item_type)
{
RingItem *link;
RING_FOREACH(link, &channel->clients) {
red_channel_client_pipe_add_type(
SPICE_CONTAINEROF(link, RedChannelClient, channel_link),
pipe_item_type);
}
}
| CWE-399 | 177,836 | 72 | 261,946,911,680,290,400,000,000,000,000,000,000,000 |
mindrot | 1bf477d3cdf1a864646d59820878783d42357a1d | 1 | x11_open_helper(Buffer *b)
{
u_char *ucp;
u_int proto_len, data_len;
u_char *ucp;
u_int proto_len, data_len;
/* Check if the fixed size part of the packet is in buffer. */
if (buffer_len(b) < 12)
return 0;
debug2("Initial X11 packet contains bad byte order byte: 0x%x",
ucp[0]);
return -1;
}
| CWE-264 | 177,838 | 73 | 186,655,838,205,464,970,000,000,000,000,000,000,000 |
samba | 538d305de91e34a2938f5f219f18bf0e1918763f | 1 | _PUBLIC_ codepoint_t next_codepoint_handle_ext(
struct smb_iconv_handle *ic,
const char *str, size_t len,
charset_t src_charset,
size_t *bytes_consumed)
{
/* it cannot occupy more than 4 bytes in UTF16 format */
uint8_t buf[4];
smb_iconv_t descriptor;
size_t ilen_orig;
size_t ilen;
size_t olen;... | CWE-200 | 177,839 | 74 | 7,537,344,539,298,055,000,000,000,000,000,000,000 |
samba | 7f51ec8c4ed9ba1f53d722e44fb6fb3cde933b72 | 1 | static int ldb_dn_escape_internal(char *dst, const char *src, int len)
{
const char *p, *s;
char *d;
size_t l;
p = s = src;
d = dst;
while (p - src < len) {
p += strcspn(p, ",=\n\r+<>#;\\\" ");
if (p - src == len) /* found no escapable chars ... | CWE-200 | 177,840 | 75 | 165,702,818,458,270,590,000,000,000,000,000,000,000 |
samba | a118d4220ed85749c07fb43c1229d9e2fecbea6b | 1 | _PUBLIC_ char *strupper_talloc_n_handle(struct smb_iconv_handle *iconv_handle,
TALLOC_CTX *ctx, const char *src, size_t n)
{
size_t size=0;
char *dest;
if (!src) {
return NULL;
}
/* this takes advantage of the fact that upper/lower can't
change the length of a character by more than 1 byte */
dest = ... | CWE-200 | 177,841 | 76 | 133,076,053,301,010,280,000,000,000,000,000,000,000 |
samba | f36cb71c330a52106e36028b3029d952257baf15 | 1 | static bool ldb_dn_explode(struct ldb_dn *dn)
{
char *p, *ex_name = NULL, *ex_value = NULL, *data, *d, *dt, *t;
bool trim = true;
bool in_extended = true;
bool in_ex_name = false;
bool in_ex_value = false;
bool in_attr = false;
bool in_value = false;
bool in_quote = false;
bool is_oid = false;
bool escape = f... | CWE-200 | 177,845 | 80 | 56,521,152,564,463,970,000,000,000,000,000,000,000 |
ghostscript | a6807394bd94b708be24758287b606154daaaed9 | 1 | gs_call_interp(i_ctx_t **pi_ctx_p, ref * pref, int user_errors,
int *pexit_code, ref * perror_object)
{
ref *epref = pref;
ref doref;
ref *perrordict;
ref error_name;
int code, ccode;
ref saref;
i_ctx_t *i_ctx_p = *pi_ctx_p;
int *gc_signal = &imemory_system->gs_lib_ctx->gc... | CWE-209 | 177,854 | 81 | 158,176,379,266,765,820,000,000,000,000,000,000,000 |
samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | 1 | NTSTATUS check_reduced_name_with_privilege(connection_struct *conn,
const char *fname,
struct smb_request *smbreq)
{
NTSTATUS status;
TALLOC_CTX *ctx = talloc_tos();
const char *conn_rootdir;
size_t rootdir_len;
char *dir_name = NULL;
const char *last_component = NULL;
char *resolved_name = NULL;
char *sa... | CWE-264 | 177,855 | 82 | 1,187,391,106,808,919,600,000,000,000,000,000,000 |
savannah | dce4683cbbe107a95f1f0d45fabc304acfb5d71a | 1 | plan_a (char const *filename)
{
char const *s;
char const *lim;
char const **ptr;
char *buffer;
lin iline;
size_t size = instat.st_size;
/* Fail if the file size doesn't fit in a size_t,
or if storage isn't available. */
if (! (size == instat.st_size
&& (buffer = malloc (size ? size : (size_t) ... | CWE-59 | 177,857 | 83 | 8,366,090,498,822,481,000,000,000,000,000,000,000 |
dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | 1 | _dbus_header_byteswap (DBusHeader *header,
int new_order)
{
if (header->byte_order == new_order)
return;
_dbus_marshal_byteswap (&_dbus_header_signature_str,
0, header->byte_order,
new_order,
... | CWE-20 | 177,858 | 84 | 9,228,036,298,590,962,000,000,000,000,000,000,000 |
ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | 1 | gs_nulldevice(gs_gstate * pgs)
{
int code = 0;
if (pgs->device == 0 || !gx_device_is_null(pgs->device)) {
gx_device *ndev;
code = gs_copydevice(&ndev, (const gx_device *)&gs_null_device,
pgs->memory);
if (code < 0)
return code;
... | CWE-78 | 177,859 | 85 | 84,413,200,937,845,430,000,000,000,000,000,000,000 |
ghostscript | 5516c614dc33662a2afdc377159f70218e67bde5 | 1 | zrestore(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
alloc_save_t *asave;
bool last;
vm_save_t *vmsave;
int code = restore_check_operand(op, &asave, idmemory);
if (code < 0)
return code;
if_debug2m('u', imemory, "[u]vmrestore 0x%lx, id = %lu\n",
(ulong) alloc_save_clie... | CWE-78 | 177,860 | 86 | 243,122,500,252,437,650,000,000,000,000,000,000,000 |
NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | 1 | destroy_one_secret (gpointer data)
{
char *secret = (char *) data;
/* Don't leave the secret lying around in memory */
g_message ("%s: destroying %s", __func__, secret);
memset (secret, 0, strlen (secret));
g_free (secret);
}
| CWE-200 | 177,861 | 87 | 1,138,568,555,668,242,800,000,000,000,000,000,000 |
libxfont | d1e670a4a8704b8708e493ab6155589bcd570608 | 1 | PatternMatch(char *pat, int patdashes, char *string, int stringdashes)
{
char c,
t;
if (stringdashes < patdashes)
return 0;
for (;;) {
switch (c = *pat++) {
case '*':
if (!(c = *pat++))
return 1;
if (c == XK_minus) {
patdashes--;
for (;;) {
while ((t = *strin... | CWE-125 | 177,865 | 90 | 235,016,592,504,912,800,000,000,000,000,000,000,000 |
ghostscript | b575e1ec42cc86f6a58c603f2a88fcc2af699cc8 | 1 | gs_call_interp(i_ctx_t **pi_ctx_p, ref * pref, int user_errors,
int *pexit_code, ref * perror_object)
{
ref *epref = pref;
ref doref;
ref *perrordict;
ref error_name;
int code, ccode;
ref saref;
i_ctx_t *i_ctx_p = *pi_ctx_p;
int *gc_signal = &imemory_system->gs_lib_ctx->gc... | CWE-388 | 177,866 | 91 | 56,777,007,913,799,830,000,000,000,000,000,000,000 |
ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | 1 | gs_main_finit(gs_main_instance * minst, int exit_status, int code)
{
i_ctx_t *i_ctx_p = minst->i_ctx_p;
gs_dual_memory_t dmem = {0};
int exit_code;
ref error_object;
char *tempnames;
/* NB: need to free gs_name_table
*/
/*
* Previous versions of this code closed the devices in th... | CWE-416 | 177,867 | 92 | 143,975,174,954,705,630,000,000,000,000,000,000,000 |
ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | 1 | zsetcolor(i_ctx_t * i_ctx_p)
{
os_ptr op = osp;
es_ptr ep;
const gs_color_space * pcs = gs_currentcolorspace(igs);
gs_client_color cc;
int n_comps, n_numeric_comps, num_offset = 0, code, depth;
PS_colour_space_t *space;
/* initialize the client ... | CWE-704 | 177,869 | 93 | 204,275,868,331,229,750,000,000,000,000,000,000,000 |
ghostscript | 0edd3d6c634a577db261615a9dc2719bca7f6e01 | 1 | ztype(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
ref tnref;
int code = array_get(imemory, op, (long)r_btype(op - 1), &tnref);
if (code < 0)
return code;
if (!r_has_type(&tnref, t_name)) {
/* Must be either a stack underflow or a t_[a]struct. */
check_op(2);
{ ... | CWE-704 | 177,870 | 94 | 6,725,827,723,091,209,000,000,000,000,000,000,000 |
savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | 1 | fd_read_body (const char *downloaded_filename, int fd, FILE *out, wgint toread, wgint startpos,
wgint *qtyread, wgint *qtywritten, double *elapsed, int flags,
FILE *out2)
{
int ret = 0;
#undef max
#define max(a,b) ((a) > (b) ? (a) : (b))
int dlbufsize = max (BUFSIZ, 8 * 1024);
char *d... | CWE-119 | 177,873 | 96 | 323,589,515,235,597,070,000,000,000,000,000,000,000 |
ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | 1 | check_file_permissions_reduced(i_ctx_t *i_ctx_p, const char *fname, int len,
gx_io_device *iodev, const char *permitgroup)
{
long i;
ref *permitlist = NULL;
/* an empty string (first character == 0) if '\' character is */
/* recognized as a file name separator as on DOS & Windows... | 177,880 | 101 | 69,859,639,183,316,940,000,000,000,000,000,000,000 | |
drm | 9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f | 1 | struct edid *drm_load_edid_firmware(struct drm_connector *connector)
{
const char *connector_name = connector->name;
char *edidname, *last, *colon, *fwstr, *edidstr, *fallback = NULL;
struct edid *edid;
if (edid_firmware[0] == '\0')
return ERR_PTR(-ENOENT);
/*
* If there are multiple edid files specified and... | CWE-476 | 177,881 | 102 | 277,136,060,870,051,900,000,000,000,000,000,000,000 |
haproxy | 7ec765568883b2d4e5a2796adbeb492a22ec9bd4 | 1 | void buffer_slow_realign(struct buffer *buf)
{
/* two possible cases :
* - the buffer is in one contiguous block, we move it in-place
* - the buffer is in two blocks, we move it via the swap_buffer
*/
if (buf->i) {
int block1 = buf->i;
int block2... | CWE-119 | 177,886 | 106 | 110,551,955,760,274,700,000,000,000,000,000,000,000 |
savannah | 3f872fe60463a931c5c766dbf8c36870c0023e88 | 1 | new_msg_register_event (u_int32_t seqnum, struct lsa_filter_type *filter)
{
u_char buf[OSPF_API_MAX_MSG_SIZE];
struct msg_register_event *emsg;
int len;
emsg = (struct msg_register_event *) buf;
len = sizeof (struct msg_register_event) +
filter->num_areas * sizeof (struct in_addr);
emsg->filter.typema... | CWE-119 | 177,888 | 107 | 24,569,741,928,780,254,000,000,000,000,000,000,000 |
End of preview.
No dataset card yet
- Downloads last month
- 61