The following issues were found
src/third_party/mozjs-60/extract/js/src/devtools/automation/autospider.py
1 issues
Line: 369
Column: 33
configure = os.path.join(DIR.js_src, 'configure')
if need_updating_configure(configure):
shutil.copyfile(configure + ".in", configure)
os.chmod(configure, 0755)
# Run configure
if not args.noconf:
run_command(['sh', '-c', posixpath.join(PDIR.js_src, 'configure') + ' ' + CONFIGURE_ARGS], check=True)
Reported by Pylint.
src/third_party/mozjs-60/extract/js/src/devtools/gc/gc-test.py
1 issues
Line: 98
Column: 20
try:
baseline_result = baseline[key]
except KeyError:
print key, 'missing from baseline'
continue
val_getter = itemgetter('TMax', 'TAvg', 'MMax', 'MAvg', 'SMax', 'SAvg')
BTMax, BTAvg, BMMax, BMAvg, BSMax, BSAvg = val_getter(baseline_result)
CTMax, CTAvg, CMMax, CMAvg, CSMax, CSAvg = val_getter(current_result)
Reported by Pylint.
src/third_party/boost/boost/optional/detail/optional_aligned_storage.hpp
1 issues
Line: 31
Column: 9
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
// BOOST_MAY_ALIAS works around GCC warnings about breaking strict aliasing rules when casting storage address to T*
union BOOST_MAY_ALIAS dummy_u
{
char data[ sizeof(T) ];
BOOST_DEDUCED_TYPENAME type_with_alignment<
::boost::alignment_of<T>::value >::type aligner_;
} dummy_ ;
public:
Reported by FlawFinder.
src/third_party/mozjs-60/extract/js/src/devtools/rootAnalysis/explain.py
1 issues
Line: 98
Column: 12
print >>hazards, gcHazards[index]
except IOError as e:
print 'Failed: %s' % str(e)
print("Wrote %s" % args.hazards)
print("Wrote %s" % args.extra)
print("Wrote %s" % args.refs)
print("Found %d hazards and %d unsafe references" % (num_hazards, num_refs))
Reported by Pylint.
src/third_party/boost/boost/multi_index_container.hpp
1 issues
Line: 1076
Column: 38
CWE codes:
362/367!
Suggestion:
Set up the correct permissions (e.g., using setuid()) and try to open the file directly
#if !defined(BOOST_MULTI_INDEX_DISABLE_SERIALIZATION)
/* serialization */
friend class boost::serialization::access;
BOOST_SERIALIZATION_SPLIT_MEMBER()
typedef typename super::index_saver_type index_saver_type;
typedef typename super::index_loader_type index_loader_type;
Reported by FlawFinder.
src/third_party/boost/boost/multi_index/sequenced_index.hpp
1 issues
Line: 997
Column: 35
CWE codes:
126
Suggestion:
This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it
const sequenced_index<SuperMeta1,TagList1>& x,
const sequenced_index<SuperMeta2,TagList2>& y)
{
return x.size()==y.size()&&std::equal(x.begin(),x.end(),y.begin());
}
template<
typename SuperMeta1,typename TagList1,
typename SuperMeta2,typename TagList2
Reported by FlawFinder.
src/third_party/boost/boost/multi_index/random_access_index.hpp
1 issues
Line: 1106
Column: 35
CWE codes:
126
Suggestion:
This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it
const random_access_index<SuperMeta1,TagList1>& x,
const random_access_index<SuperMeta2,TagList2>& y)
{
return x.size()==y.size()&&std::equal(x.begin(),x.end(),y.begin());
}
template<
typename SuperMeta1,typename TagList1,
typename SuperMeta2,typename TagList2
Reported by FlawFinder.
src/third_party/boost/boost/multi_index/detail/serialization_version.hpp
1 issues
Line: 43
Column: 38
CWE codes:
362/367!
Suggestion:
Set up the correct permissions (e.g., using setuid()) and try to open the file directly
operator unsigned int()const{return value;}
private:
friend class boost::serialization::access;
BOOST_SERIALIZATION_SPLIT_MEMBER()
template<class Archive>
void save(Archive&,const unsigned int)const{}
Reported by FlawFinder.
src/third_party/mozjs-60/extract/js/src/devtools/vprof/vprof.h
1 issues
Line: 249
Column: 5
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
vprof_align8(double) dvar[NUM_EVARS];
//
char pad[128]; // avoid false sharing
} *entry_t;
#define _VAL ((entry_t)vprofID)->value
#define _COUNT ((entry_t)vprofID)->count
#define _SUM ((entry_t)vprofID)->sum
Reported by FlawFinder.
src/third_party/mozjs-60/extract/js/src/dtoa.c
1 issues
Line: 608
Column: 20
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
}
}
#define Bcopy(x,y) memcpy((char *)&x->sign, (char *)&y->sign, \
y->wds*sizeof(Long) + 2*sizeof(int))
static Bigint *
multadd
#ifdef KR_headers
Reported by FlawFinder.