Unnamed: 0 int64 0 56k | source_code stringlengths 55 5.98k | comments stringlengths 2 1.76k | label stringclasses 68 values | dataset_name stringclasses 1 value | file_name stringlengths 208 265 | function stringlengths 27 87 | decompiled_code stringlengths 68 3.97k | compiler_options stringclasses 1 value |
|---|---|---|---|---|---|---|---|---|
11,200 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_bad()
{
size_t data;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_structType myStruct;
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
myStruct.structFirst = data;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_badSink(myStruct);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117118/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_bad(void)
{
undefined8 uStack_10;
uStack_10 = 0;
func_0x00400ab0(stdin,&UNK_00401284,&uStack_10);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_badSink(uStack_10);
return;
}
| ['gcc'] |
11,201 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117118/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,202 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_badSink(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_structType myStruct)
{
size_t data = myStruct.structFirst;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117118/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_badSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401288);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,203 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_goodG2BSink(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_structType myStruct)
{
size_t data = myStruct.structFirst;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117118/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401338);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,204 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_goodB2GSink(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_structType myStruct)
{
size_t data = myStruct.structFirst;
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117118/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_goodB2GSink(ulong param_1)
{
undefined4 *puVar1;
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_00401370);
}
else {
puVar1 = (undefined4 *)func_0x00400b40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,205 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_bad()
{
size_t data;
/* Initialize data */
data = 0;
/* POTENTIAL FLAW: Read data from the console using fscanf() */
fscanf(stdin, "%ud", &data);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_badData = data;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_badSink();
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117119/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_bad(void)
{
undefined8 uStack_10;
uStack_10 = 0;
func_0x00400ab0(stdin,&UNK_00401284,&uStack_10);
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_badData = uStack_10;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_badSink();
return;
}
| ['gcc'] |
11,206 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117119/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,207 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_badSink()
{
size_t data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_badData;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117119/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_badSink(void)
{
undefined4 *puVar1;
if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_badData < 6) {
printLine(&UNK_00401288);
}
else {
puVar1 = (undefined4 *)
func_0x00400b40(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_badData);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,208 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_goodG2BSink()
{
size_t data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_goodG2BData;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117119/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_goodG2BSink(void)
{
undefined4 *puVar1;
if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_goodG2BData < 6) {
printLine(&UNK_00401338);
}
else {
puVar1 = (undefined4 *)
func_0x00400b40(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_goodG2BData);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,209 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_goodB2GSink()
{
size_t data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_goodB2GData;
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117119/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_goodB2GSink(void)
{
undefined4 *puVar1;
if ((CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_goodB2GData < 6) ||
(99 < CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_goodB2GData)) {
printLine(&UNK_00401370);
}
else {
puVar1 = (undefined4 *)
func_0x00400b40(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_goodB2GData);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400aa0(puVar1);
}
return;
}
| ['gcc'] |
11,210 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_01_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117127/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_01.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_01_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_01_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
undefined4 *puStack_28;
int iStack_1c;
int iStack_18;
int iStack_14;
ulong uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
if (uStack_10 < 6) {
printLine(&UNK_004015b8);
}
else {
puStack_28 = (undefined4 *)func_0x00400d40(uStack_10);
*puStack_28 = 0x6c6c6568;
*(undefined2 *)(puStack_28 + 1) = 0x6f;
printLine(puStack_28);
func_0x00400c70(puStack_28);
}
return;
}
| ['gcc'] |
11,211 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_01_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117127/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_01.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_01_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_01_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,212 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_02_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(1)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
if(1)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117128/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_02.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_02_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_02_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
undefined4 *puStack_28;
int iStack_1c;
int iStack_18;
int iStack_14;
ulong uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
if (uStack_10 < 6) {
printLine(&UNK_004015b8);
}
else {
puStack_28 = (undefined4 *)func_0x00400d40(uStack_10);
*puStack_28 = 0x6c6c6568;
*(undefined2 *)(puStack_28 + 1) = 0x6f;
printLine(puStack_28);
func_0x00400c70(puStack_28);
}
return;
}
| ['gcc'] |
11,213 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_02_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117128/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_02.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_02_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_02_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,214 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_03_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(5==5)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
if(5==5)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117129/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_03.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_03_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_03_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
undefined4 *puStack_28;
int iStack_1c;
int iStack_18;
int iStack_14;
ulong uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
if (uStack_10 < 6) {
printLine(&UNK_004015b8);
}
else {
puStack_28 = (undefined4 *)func_0x00400d40(uStack_10);
*puStack_28 = 0x6c6c6568;
*(undefined2 *)(puStack_28 + 1) = 0x6f;
printLine(puStack_28);
func_0x00400c70(puStack_28);
}
return;
}
| ['gcc'] |
11,215 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_03_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117129/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_03.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_03_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_03_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,216 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_05_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(staticTrue)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
if(staticTrue)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117131/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_05.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_05_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_05_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
undefined4 *puStack_28;
int iStack_1c;
int iStack_18;
int iStack_14;
ulong uStack_10;
uStack_10 = 0;
if (staticTrue != 0) {
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
}
if (staticTrue != 0) {
if (uStack_10 < 6) {
printLine(&UNK_004015d8);
}
else {
puStack_28 = (undefined4 *)func_0x00400d40(uStack_10);
*puStack_28 = 0x6c6c6568;
*(undefined2 *)(puStack_28 + 1) = 0x6f;
printLine(puStack_28);
func_0x00400c70(puStack_28);
}
}
return;
}
| ['gcc'] |
11,217 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_05_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117131/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_05.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_05_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_05_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,218 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_06_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(STATIC_CONST_FIVE==5)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
if(STATIC_CONST_FIVE==5)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117132/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_06.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_06_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_06_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
undefined4 *puStack_28;
int iStack_1c;
int iStack_18;
int iStack_14;
ulong uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
if (uStack_10 < 6) {
printLine(&UNK_004015e0);
}
else {
puStack_28 = (undefined4 *)func_0x00400d40(uStack_10);
*puStack_28 = 0x6c6c6568;
*(undefined2 *)(puStack_28 + 1) = 0x6f;
printLine(puStack_28);
func_0x00400c70(puStack_28);
}
return;
}
| ['gcc'] |
11,219 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_06_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117132/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_06.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_06_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_06_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,220 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_07_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(staticFive==5)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
if(staticFive==5)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117133/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_07.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_07_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_07_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
undefined4 *puStack_28;
int iStack_1c;
int iStack_18;
int iStack_14;
ulong uStack_10;
uStack_10 = 0;
if (staticFive == 5) {
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
}
if (staticFive == 5) {
if (uStack_10 < 6) {
printLine(&UNK_004015d8);
}
else {
puStack_28 = (undefined4 *)func_0x00400d40(uStack_10);
*puStack_28 = 0x6c6c6568;
*(undefined2 *)(puStack_28 + 1) = 0x6f;
printLine(puStack_28);
func_0x00400c70(puStack_28);
}
}
return;
}
| ['gcc'] |
11,221 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_07_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117133/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_07.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_07_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_07_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,222 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_08_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(staticReturnsTrue())
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
if(staticReturnsTrue())
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117134/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_08.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_08_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_08_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
undefined4 *puStack_28;
int iStack_1c;
int iStack_18;
int iStack_14;
ulong uStack_10;
uStack_10 = 0;
iVar1 = staticReturnsTrue();
if (iVar1 != 0) {
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
}
iVar1 = staticReturnsTrue();
if (iVar1 != 0) {
if (uStack_10 < 6) {
printLine(&UNK_004015e8);
}
else {
puStack_28 = (undefined4 *)func_0x00400d40(uStack_10);
*puStack_28 = 0x6c6c6568;
*(undefined2 *)(puStack_28 + 1) = 0x6f;
printLine(puStack_28);
func_0x00400c70(puStack_28);
}
}
return;
}
| ['gcc'] |
11,223 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_08_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117134/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_08.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_08_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_08_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,224 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_09_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(GLOBAL_CONST_TRUE)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
if(GLOBAL_CONST_TRUE)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117135/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_09.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_09_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_09_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
undefined4 *puStack_28;
int iStack_1c;
int iStack_18;
int iStack_14;
ulong uStack_10;
uStack_10 = 0;
if (GLOBAL_CONST_TRUE != 0) {
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
}
if (GLOBAL_CONST_TRUE != 0) {
if (uStack_10 < 6) {
printLine(&UNK_004015d8);
}
else {
puStack_28 = (undefined4 *)func_0x00400d40(uStack_10);
*puStack_28 = 0x6c6c6568;
*(undefined2 *)(puStack_28 + 1) = 0x6f;
printLine(puStack_28);
func_0x00400c70(puStack_28);
}
}
return;
}
| ['gcc'] |
11,225 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_09_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117135/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_09.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_09_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_09_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,226 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_14_bad()
{
size_t data;
/* Initialize data */
data = 0;
if(globalFive==5)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
if(globalFive==5)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117140/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_14.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_14_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_14_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
undefined4 *puStack_28;
int iStack_1c;
int iStack_18;
int iStack_14;
ulong uStack_10;
uStack_10 = 0;
if (globalFive == 5) {
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
}
if (globalFive == 5) {
if (uStack_10 < 6) {
printLine(&UNK_004015d8);
}
else {
puStack_28 = (undefined4 *)func_0x00400d40(uStack_10);
*puStack_28 = 0x6c6c6568;
*(undefined2 *)(puStack_28 + 1) = 0x6f;
printLine(puStack_28);
func_0x00400c70(puStack_28);
}
}
return;
}
| ['gcc'] |
11,227 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_14_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117140/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_14.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_14_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_14_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,228 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_15_bad()
{
size_t data;
/* Initialize data */
data = 0;
switch(6)
{
case 6:
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
break;
default:
/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */
printLine("Benign, fixed string");
break;
}
switch(7)
{
case 7:
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
break;
default:
/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */
printLine("Benign, fixed string");
break;
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117141/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_15.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_15_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_15_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
undefined4 *puStack_28;
int iStack_1c;
int iStack_18;
int iStack_14;
ulong uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
if (uStack_10 < 6) {
printLine(&UNK_004015b8);
}
else {
puStack_28 = (undefined4 *)func_0x00400d40(uStack_10);
*puStack_28 = 0x6c6c6568;
*(undefined2 *)(puStack_28 + 1) = 0x6f;
printLine(puStack_28);
func_0x00400c70(puStack_28);
}
return;
}
| ['gcc'] |
11,229 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_15_good()
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117141/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_15.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_15_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_15_good(void)
{
goodB2G1();
goodB2G2();
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
11,230 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_16_bad()
{
size_t data;
/* Initialize data */
data = 0;
while(1)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
break;
}
while(1)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
break;
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117142/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_16.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_16_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_16_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
undefined4 *puStack_28;
int iStack_1c;
int iStack_18;
int iStack_14;
ulong uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
if (uStack_10 < 6) {
printLine(&UNK_004015b8);
}
else {
puStack_28 = (undefined4 *)func_0x00400d40(uStack_10);
*puStack_28 = 0x6c6c6568;
*(undefined2 *)(puStack_28 + 1) = 0x6f;
printLine(puStack_28);
func_0x00400c70(puStack_28);
}
return;
}
| ['gcc'] |
11,231 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_16_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117142/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_16.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_16_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_16_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
11,232 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_17_bad()
{
int i,j;
size_t data;
/* Initialize data */
data = 0;
for(i = 0; i < 1; i++)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
}
for(j = 0; j < 1; j++)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117143/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_17.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_17_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_17_bad(void)
{
int iVar1;
undefined auStack_68 [32];
undefined2 uStack_48;
undefined2 uStack_46;
undefined4 uStack_44;
int iStack_30;
int iStack_2c;
undefined4 *puStack_28;
int iStack_1c;
ulong uStack_18;
int iStack_10;
int iStack_c;
uStack_18 = 0;
for (iStack_c = 0; iStack_c < 1; iStack_c = iStack_c + 1) {
iStack_2c = 0xffffffff;
iStack_1c = -1;
iStack_2c = func_0x00400dd0(2,1,6);
if (iStack_2c != -1) {
func_0x00400cd0(&uStack_48,0,0x10);
uStack_48 = 2;
uStack_44 = 0;
uStack_46 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_2c,&uStack_48,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_2c,5), iVar1 != -1)) &&
(iStack_1c = func_0x00400d90(iStack_2c,0,0), iStack_1c != -1)) &&
((iStack_30 = func_0x00400c80(iStack_1c,auStack_68,0x19,0), iStack_30 != -1 &&
(iStack_30 != 0)))) {
auStack_68[iStack_30] = 0;
uStack_18 = func_0x00400da0(auStack_68,0,0);
}
}
if (iStack_2c != -1) {
func_0x00400ce0(iStack_2c);
}
if (iStack_1c != -1) {
func_0x00400ce0(iStack_1c);
}
}
for (iStack_10 = 0; iStack_10 < 1; iStack_10 = iStack_10 + 1) {
if (uStack_18 < 6) {
printLine(&UNK_004015e8);
}
else {
puStack_28 = (undefined4 *)func_0x00400d40(uStack_18);
*puStack_28 = 0x6c6c6568;
*(undefined2 *)(puStack_28 + 1) = 0x6f;
printLine(puStack_28);
func_0x00400c70(puStack_28);
}
}
return;
}
| ['gcc'] |
11,233 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_17_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117143/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_17.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_17_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_17_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
11,234 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_18_bad()
{
size_t data;
/* Initialize data */
data = 0;
goto source;
source:
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
goto sink;
sink:
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117144/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_18.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_18_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_18_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
undefined4 *puStack_28;
int iStack_1c;
int iStack_18;
int iStack_14;
ulong uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
if (uStack_10 < 6) {
printLine(&UNK_004015b8);
}
else {
puStack_28 = (undefined4 *)func_0x00400d40(uStack_10);
*puStack_28 = 0x6c6c6568;
*(undefined2 *)(puStack_28 + 1) = 0x6f;
printLine(puStack_28);
func_0x00400c70(puStack_28);
}
return;
}
| ['gcc'] |
11,235 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_18_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117144/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_18.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_18_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_18_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
11,236 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_21_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
badStatic = 1; /* true */
badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* true */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117145/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_21.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_21_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_21_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
int iStack_1c;
int iStack_18;
int iStack_14;
undefined8 uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
badStatic = 1;
badSink(uStack_10);
return;
}
| ['gcc'] |
11,237 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_21_good()
{
goodB2G1();
goodB2G2();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117145/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_21.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_21_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_21_good(void)
{
goodB2G1();
goodB2G2();
goodG2B();
return;
}
| ['gcc'] |
11,238 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badGlobal = 1; /* true */
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* true */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117146/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
int iStack_1c;
int iStack_18;
int iStack_14;
undefined8 uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badGlobal = 1;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badSink(uStack_10);
return;
}
| ['gcc'] |
11,239 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_good()
{
goodB2G1();
goodB2G2();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117146/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_good(void)
{
goodB2G1();
goodB2G2();
goodG2B();
return;
}
| ['gcc'] |
11,240 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badSink(size_t data)
{
if(CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badGlobal)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117146/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badSink(ulong param_1)
{
undefined4 *puVar1;
if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badGlobal != 0) {
if (param_1 < 6) {
printLine(&UNK_004015e8);
}
else {
puVar1 = (undefined4 *)func_0x00400d40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400c70(puVar1);
}
}
return;
}
| ['gcc'] |
11,241 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G1Sink(size_t data)
{
if(CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G1Global)
{
/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */
printLine("Benign, fixed string");
}
else
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
}
} | ['/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117146/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G1Sink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G1Sink(ulong param_1)
{
undefined4 *puVar1;
if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G1Global == 0) {
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_00401890);
}
else {
puVar1 = (undefined4 *)func_0x00400d40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400c70(puVar1);
}
}
else {
printLine(&UNK_00401878);
}
return;
}
| ['gcc'] |
11,242 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G2Sink(size_t data)
{
if(CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G2Global)
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117146/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G2Sink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G2Sink(ulong param_1)
{
undefined4 *puVar1;
if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G2Global != 0) {
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_00401890);
}
else {
puVar1 = (undefined4 *)func_0x00400d40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400c70(puVar1);
}
}
return;
}
| ['gcc'] |
11,243 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodG2BSink(size_t data)
{
if(CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodG2BGlobal)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117146/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodG2BGlobal != 0) {
if (param_1 < 6) {
printLine(&UNK_004018d0);
}
else {
puVar1 = (undefined4 *)func_0x00400d40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400c70(puVar1);
}
}
return;
}
| ['gcc'] |
11,244 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_31_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
{
size_t dataCopy = data;
size_t data = dataCopy;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117147/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_31.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_31_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_31_bad(void)
{
int iVar1;
undefined auStack_68 [32];
undefined2 uStack_48;
undefined2 uStack_46;
undefined4 uStack_44;
undefined4 *puStack_38;
ulong uStack_30;
ulong uStack_28;
int iStack_1c;
int iStack_18;
int iStack_14;
ulong uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_48,0,0x10);
uStack_48 = 2;
uStack_44 = 0;
uStack_46 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_48,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_68,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_68[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_68,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
uStack_28 = uStack_10;
uStack_30 = uStack_10;
if (uStack_10 < 6) {
printLine(&UNK_004015c8);
}
else {
puStack_38 = (undefined4 *)func_0x00400d40(uStack_10);
*puStack_38 = 0x6c6c6568;
*(undefined2 *)(puStack_38 + 1) = 0x6f;
printLine(puStack_38);
func_0x00400c70(puStack_38);
}
return;
}
| ['gcc'] |
11,245 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_31_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117147/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_31.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_31_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_31_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,246 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_32_bad()
{
size_t data;
size_t *dataPtr1 = &data;
size_t *dataPtr2 = &data;
/* Initialize data */
data = 0;
{
size_t data = *dataPtr1;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
*dataPtr1 = data;
}
{
size_t data = *dataPtr2;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117148/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_32.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_32_bad |
/* WARNING: Restarted to delay deadcode elimination for space: stack */
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_32_bad(void)
{
int iVar1;
undefined auStack_78 [32];
undefined2 uStack_58;
undefined2 uStack_56;
undefined4 uStack_54;
ulong uStack_48;
undefined4 *puStack_40;
ulong uStack_38;
int iStack_30;
int iStack_2c;
ulong *puStack_28;
ulong *puStack_20;
int iStack_14;
ulong uStack_10;
puStack_20 = &uStack_48;
puStack_28 = &uStack_48;
uStack_48 = 0;
uStack_10 = 0;
iStack_2c = 0xffffffff;
iStack_14 = -1;
iStack_2c = func_0x00400dd0(2,1,6);
if (iStack_2c != -1) {
func_0x00400cd0(&uStack_58,0,0x10);
uStack_58 = 2;
uStack_54 = 0;
uStack_56 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_2c,&uStack_58,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_2c,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_2c,0,0), iStack_14 != -1)) &&
((iStack_30 = func_0x00400c80(iStack_14,auStack_78,0x19,0), iStack_30 != -1 &&
(iStack_30 != 0)))) {
auStack_78[iStack_30] = 0;
uStack_10 = func_0x00400da0(auStack_78,0,0);
}
}
if (iStack_2c != -1) {
func_0x00400ce0(iStack_2c);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
*puStack_20 = uStack_10;
uStack_38 = *puStack_28;
if (uStack_38 < 6) {
printLine(&UNK_004015e8);
}
else {
puStack_40 = (undefined4 *)func_0x00400d40(uStack_38);
*puStack_40 = 0x6c6c6568;
*(undefined2 *)(puStack_40 + 1) = 0x6f;
printLine(puStack_40);
func_0x00400c70(puStack_40);
}
return;
}
| ['gcc'] |
11,247 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_32_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117148/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_32.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_32_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_32_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,248 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34_bad()
{
size_t data;
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34_unionType myUnion;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
myUnion.unionFirst = data;
{
size_t data = myUnion.unionSecond;
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117150/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34_bad(void)
{
int iVar1;
undefined auStack_68 [32];
undefined2 uStack_48;
undefined2 uStack_46;
undefined4 uStack_44;
ulong uStack_38;
undefined4 *puStack_30;
ulong uStack_28;
int iStack_1c;
int iStack_18;
int iStack_14;
ulong uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_48,0,0x10);
uStack_48 = 2;
uStack_44 = 0;
uStack_46 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_48,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_68,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_68[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_68,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
uStack_38 = uStack_10;
uStack_28 = uStack_10;
if (uStack_10 < 6) {
printLine(&UNK_004015c8);
}
else {
puStack_30 = (undefined4 *)func_0x00400d40(uStack_10);
*puStack_30 = 0x6c6c6568;
*(undefined2 *)(puStack_30 + 1) = 0x6f;
printLine(puStack_30);
func_0x00400c70(puStack_30);
}
return;
}
| ['gcc'] |
11,249 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117150/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,250 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_41_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117151/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_41.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_41_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_41_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
int iStack_1c;
int iStack_18;
int iStack_14;
undefined8 uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
badSink(uStack_10);
return;
}
| ['gcc'] |
11,251 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_41_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117151/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_41.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_41_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_41_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
11,252 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_42_bad()
{
size_t data;
/* Initialize data */
data = 0;
data = badSource(data);
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117152/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_42.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_42_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_42_bad(void)
{
ulong uVar1;
undefined4 *puVar2;
uVar1 = badSource(0);
if (uVar1 < 6) {
printLine(&UNK_004015d8);
}
else {
puVar2 = (undefined4 *)func_0x00400d40(uVar1);
*puVar2 = 0x6c6c6568;
*(undefined2 *)(puVar2 + 1) = 0x6f;
printLine(puVar2);
func_0x00400c70(puVar2);
}
return;
}
| ['gcc'] |
11,253 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_42_good()
{
goodB2G();
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117152/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_42.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_42_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_42_good(void)
{
goodB2G();
goodG2B();
return;
}
| ['gcc'] |
11,254 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_44_bad()
{
size_t data;
/* define a function pointer */
void (*funcPtr) (size_t) = badSink;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
/* use the function pointer */
funcPtr(data);
} | ['/* define a function pointer */', '/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* use the function pointer */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117154/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_44.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_44_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_44_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
int iStack_28;
int iStack_24;
code *pcStack_20;
int iStack_14;
undefined8 uStack_10;
pcStack_20 = badSink;
uStack_10 = 0;
iStack_24 = 0xffffffff;
iStack_14 = -1;
iStack_24 = func_0x00400dd0(2,1,6);
if (iStack_24 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_24,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_24,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_24,0,0), iStack_14 != -1)) &&
((iStack_28 = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_28 != -1 &&
(iStack_28 != 0)))) {
auStack_58[iStack_28] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_24 != -1) {
func_0x00400ce0(iStack_24);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
(*pcStack_20)(uStack_10);
return;
}
| ['gcc'] |
11,255 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_44_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117154/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_44.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_44_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_44_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,256 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45_badData = data;
badSink();
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117155/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
int iStack_1c;
int iStack_18;
int iStack_14;
undefined8 uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45_badData = uStack_10;
badSink();
return;
}
| ['gcc'] |
11,257 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117155/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,258 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117156/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
int iStack_1c;
int iStack_18;
int iStack_14;
undefined8 uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_badSink(uStack_10);
return;
}
| ['gcc'] |
11,259 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117156/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,260 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_badSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117156/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_badSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_004015d8);
}
else {
puVar1 = (undefined4 *)func_0x00400d40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400c70(puVar1);
}
return;
}
| ['gcc'] |
11,261 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_goodG2BSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117156/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401678);
}
else {
puVar1 = (undefined4 *)func_0x00400d40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400c70(puVar1);
}
return;
}
| ['gcc'] |
11,262 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_goodB2GSink(size_t data)
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117156/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_goodB2GSink(ulong param_1)
{
undefined4 *puVar1;
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_004016b0);
}
else {
puVar1 = (undefined4 *)func_0x00400d40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400c70(puVar1);
}
return;
}
| ['gcc'] |
11,263 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117157/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
int iStack_1c;
int iStack_18;
int iStack_14;
undefined8 uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_badSink(uStack_10);
return;
}
| ['gcc'] |
11,264 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117157/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,265 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117157/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_badSink(param_1);
return;
}
| ['gcc'] |
11,266 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117157/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,267 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117157/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,268 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_badSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117157/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_badSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_004015e8);
}
else {
puVar1 = (undefined4 *)func_0x00400d40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400c70(puVar1);
}
return;
}
| ['gcc'] |
11,269 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodG2BSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117157/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_004016a8);
}
else {
puVar1 = (undefined4 *)func_0x00400d40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400c70(puVar1);
}
return;
}
| ['gcc'] |
11,270 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodB2GSink(size_t data)
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117157/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodB2GSink(ulong param_1)
{
undefined4 *puVar1;
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_004016e0);
}
else {
puVar1 = (undefined4 *)func_0x00400d40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400c70(puVar1);
}
return;
}
| ['gcc'] |
11,271 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
int iStack_1c;
int iStack_18;
int iStack_14;
undefined8 uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_badSink(uStack_10);
return;
}
| ['gcc'] |
11,272 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,273 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_badSink(param_1);
return;
}
| ['gcc'] |
11,274 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,275 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,276 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_badSink(param_1);
return;
}
| ['gcc'] |
11,277 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,278 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,279 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_badSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_badSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401608);
}
else {
puVar1 = (undefined4 *)func_0x00400d40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400c70(puVar1);
}
return;
}
| ['gcc'] |
11,280 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodG2BSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_004016e8);
}
else {
puVar1 = (undefined4 *)func_0x00400d40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400c70(puVar1);
}
return;
}
| ['gcc'] |
11,281 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodB2GSink(size_t data)
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodB2GSink(ulong param_1)
{
undefined4 *puVar1;
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_00401720);
}
else {
puVar1 = (undefined4 *)func_0x00400d40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400c70(puVar1);
}
return;
}
| ['gcc'] |
11,282 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54_bad()
{
size_t data;
/* Initialize data */
data = 0;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54_bad(void)
{
int iVar1;
undefined auStack_58 [32];
undefined2 uStack_38;
undefined2 uStack_36;
undefined4 uStack_34;
int iStack_1c;
int iStack_18;
int iStack_14;
undefined8 uStack_10;
uStack_10 = 0;
iStack_18 = 0xffffffff;
iStack_14 = -1;
iStack_18 = func_0x00400dd0(2,1,6);
if (iStack_18 != -1) {
func_0x00400cd0(&uStack_38,0,0x10);
uStack_38 = 2;
uStack_34 = 0;
uStack_36 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) &&
(iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) &&
((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 &&
(iStack_1c != 0)))) {
auStack_58[iStack_1c] = 0;
uStack_10 = func_0x00400da0(auStack_58,0,0);
}
}
if (iStack_18 != -1) {
func_0x00400ce0(iStack_18);
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_badSink(uStack_10);
return;
}
| ['gcc'] |
11,283 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,284 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_badSink(param_1);
return;
}
| ['gcc'] |
11,285 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,286 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,287 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_badSink(param_1);
return;
}
| ['gcc'] |
11,288 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,289 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,290 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_badSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_badSink(data);
} | [] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_badSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_badSink(param_1);
return;
}
| ['gcc'] |
11,291 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodG2BSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodG2BSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodG2BSink(param_1);
return;
}
| ['gcc'] |
11,292 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodB2GSink(size_t data)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodB2GSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodB2GSink(undefined8 param_1)
{
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodB2GSink(param_1);
return;
}
| ['gcc'] |
11,293 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_badSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_badSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_badSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401628);
}
else {
puVar1 = (undefined4 *)func_0x00400d40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400c70(puVar1);
}
return;
}
| ['gcc'] |
11,294 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodG2BSink(size_t data)
{
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodG2BSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodG2BSink(ulong param_1)
{
undefined4 *puVar1;
if (param_1 < 6) {
printLine(&UNK_00401718);
}
else {
puVar1 = (undefined4 *)func_0x00400d40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400c70(puVar1);
}
return;
}
| ['gcc'] |
11,295 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodB2GSink(size_t data)
{
{
char * myString;
/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING) && data < 100)
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string or too large");
}
}
} | ['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodB2GSink |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodB2GSink(ulong param_1)
{
undefined4 *puVar1;
if ((param_1 < 6) || (99 < param_1)) {
printLine(&UNK_00401750);
}
else {
puVar1 = (undefined4 *)func_0x00400d40(param_1);
*puVar1 = 0x6c6c6568;
*(undefined2 *)(puVar1 + 1) = 0x6f;
printLine(puVar1);
func_0x00400c70(puVar1);
}
return;
}
| ['gcc'] |
11,296 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61_bad()
{
size_t data;
/* Initialize data */
data = 0;
data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b_badSource(data);
{
char * myString;
/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough
* for the strcpy() function to not cause a buffer overflow */
/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */
if (data > strlen(HELLO_STRING))
{
myString = (char *)malloc(data*sizeof(char));
/* Copy a small string into myString */
strcpy(myString, HELLO_STRING);
printLine(myString);
free(myString);
}
else
{
printLine("Input is less than the length of the source string");
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117160/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61_bad |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61_bad(void)
{
ulong uVar1;
undefined4 *puVar2;
uVar1 = CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b_badSource(0);
if (uVar1 < 6) {
printLine(&UNK_004015d8);
}
else {
puVar2 = (undefined4 *)func_0x00400d40(uVar1);
*puVar2 = 0x6c6c6568;
*(undefined2 *)(puVar2 + 1) = 0x6f;
printLine(puVar2);
func_0x00400c70(puVar2);
}
return;
}
| ['gcc'] |
11,297 | void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61_good()
{
goodG2B();
goodB2G();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117160/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61a.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61_good |
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61_good(void)
{
goodG2B();
goodB2G();
return;
}
| ['gcc'] |
11,298 | size_t CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b_badSource(size_t data)
{
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to unsigned int */
data = strtoul(inputBuffer, NULL, 0);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
return data;
} | ['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */'] | ['CWE789'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117160/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b_badSource |
undefined8
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b_badSource(undefined8 param_1)
{
int iVar1;
undefined8 uStack_50;
undefined auStack_48 [32];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_14;
int iStack_10;
int iStack_c;
iStack_10 = 0xffffffff;
iStack_c = -1;
iStack_10 = func_0x00400dd0(2,1,6);
uStack_50 = param_1;
if (iStack_10 != -1) {
func_0x00400cd0(&uStack_28,0,0x10);
uStack_28 = 2;
uStack_24 = 0;
uStack_26 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_10,&uStack_28,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_10,5), iVar1 != -1)) &&
(iStack_c = func_0x00400d90(iStack_10,0,0), iStack_c != -1)) &&
((iStack_14 = func_0x00400c80(iStack_c,auStack_48,0x19,0), iStack_14 != -1 &&
(iStack_14 != 0)))) {
auStack_48[iStack_14] = 0;
uStack_50 = func_0x00400da0(auStack_48,0,0);
}
}
if (iStack_10 != -1) {
func_0x00400ce0(iStack_10);
}
if (iStack_c != -1) {
func_0x00400ce0(iStack_c);
}
return uStack_50;
}
| ['gcc'] |
11,299 | size_t CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b_goodG2BSource(size_t data)
{
/* FIX: Use a relatively small number for memory allocation */
data = 20;
return data;
} | ['/* FIX: Use a relatively small number for memory allocation */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117160/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b.c | CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b_goodG2BSource |
undefined8 CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b_goodG2BSource(void)
{
return 0x14;
}
| ['gcc'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.