Unnamed: 0
int64
0
56k
source_code
stringlengths
55
5.98k
comments
stringlengths
2
1.76k
label
stringclasses
68 values
dataset_name
stringclasses
1 value
file_name
stringlengths
208
265
function
stringlengths
27
87
decompiled_code
stringlengths
68
3.97k
compiler_options
stringclasses
1 value
11,200
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_bad() { size_t data; CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_structType myStruct; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); myStruct.structFirst = data; CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_badSink(myStruct); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117118/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_bad(void) { undefined8 uStack_10; uStack_10 = 0; func_0x00400ab0(stdin,&UNK_00401284,&uStack_10); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_badSink(uStack_10); return; }
['gcc']
11,201
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117118/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,202
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_badSink(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_structType myStruct) { size_t data = myStruct.structFirst; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117118/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_badSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401288); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,203
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_goodG2BSink(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_structType myStruct) { size_t data = myStruct.structFirst; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117118/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401338); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,204
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_goodB2GSink(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67_structType myStruct) { size_t data = myStruct.structFirst; { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117118/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_67b_goodB2GSink(ulong param_1) { undefined4 *puVar1; if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_00401370); } else { puVar1 = (undefined4 *)func_0x00400b40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,205
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_bad() { size_t data; /* Initialize data */ data = 0; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%ud", &data); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_badData = data; CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_badSink(); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117119/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_bad(void) { undefined8 uStack_10; uStack_10 = 0; func_0x00400ab0(stdin,&UNK_00401284,&uStack_10); CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_badData = uStack_10; CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_badSink(); return; }
['gcc']
11,206
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117119/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,207
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_badSink() { size_t data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_badData; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117119/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_badSink(void) { undefined4 *puVar1; if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_badData < 6) { printLine(&UNK_00401288); } else { puVar1 = (undefined4 *) func_0x00400b40(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_badData); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,208
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_goodG2BSink() { size_t data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_goodG2BData; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117119/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_goodG2BSink(void) { undefined4 *puVar1; if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_goodG2BData < 6) { printLine(&UNK_00401338); } else { puVar1 = (undefined4 *) func_0x00400b40(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_goodG2BData); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,209
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_goodB2GSink() { size_t data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_goodB2GData; { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117119/CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68b_goodB2GSink(void) { undefined4 *puVar1; if ((CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_goodB2GData < 6) || (99 < CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_goodB2GData)) { printLine(&UNK_00401370); } else { puVar1 = (undefined4 *) func_0x00400b40(CWE789_Uncontrolled_Mem_Alloc__malloc_char_fscanf_68_goodB2GData); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400aa0(puVar1); } return; }
['gcc']
11,210
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_01_bad() { size_t data; /* Initialize data */ data = 0; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117127/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_01.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_01_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_01_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; undefined4 *puStack_28; int iStack_1c; int iStack_18; int iStack_14; ulong uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } if (uStack_10 < 6) { printLine(&UNK_004015b8); } else { puStack_28 = (undefined4 *)func_0x00400d40(uStack_10); *puStack_28 = 0x6c6c6568; *(undefined2 *)(puStack_28 + 1) = 0x6f; printLine(puStack_28); func_0x00400c70(puStack_28); } return; }
['gcc']
11,211
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_01_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117127/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_01.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_01_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_01_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,212
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_02_bad() { size_t data; /* Initialize data */ data = 0; if(1) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } if(1) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117128/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_02.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_02_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_02_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; undefined4 *puStack_28; int iStack_1c; int iStack_18; int iStack_14; ulong uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } if (uStack_10 < 6) { printLine(&UNK_004015b8); } else { puStack_28 = (undefined4 *)func_0x00400d40(uStack_10); *puStack_28 = 0x6c6c6568; *(undefined2 *)(puStack_28 + 1) = 0x6f; printLine(puStack_28); func_0x00400c70(puStack_28); } return; }
['gcc']
11,213
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_02_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117128/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_02.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_02_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_02_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,214
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_03_bad() { size_t data; /* Initialize data */ data = 0; if(5==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } if(5==5) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117129/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_03.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_03_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_03_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; undefined4 *puStack_28; int iStack_1c; int iStack_18; int iStack_14; ulong uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } if (uStack_10 < 6) { printLine(&UNK_004015b8); } else { puStack_28 = (undefined4 *)func_0x00400d40(uStack_10); *puStack_28 = 0x6c6c6568; *(undefined2 *)(puStack_28 + 1) = 0x6f; printLine(puStack_28); func_0x00400c70(puStack_28); } return; }
['gcc']
11,215
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_03_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117129/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_03.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_03_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_03_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,216
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_05_bad() { size_t data; /* Initialize data */ data = 0; if(staticTrue) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } if(staticTrue) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117131/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_05.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_05_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_05_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; undefined4 *puStack_28; int iStack_1c; int iStack_18; int iStack_14; ulong uStack_10; uStack_10 = 0; if (staticTrue != 0) { iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } } if (staticTrue != 0) { if (uStack_10 < 6) { printLine(&UNK_004015d8); } else { puStack_28 = (undefined4 *)func_0x00400d40(uStack_10); *puStack_28 = 0x6c6c6568; *(undefined2 *)(puStack_28 + 1) = 0x6f; printLine(puStack_28); func_0x00400c70(puStack_28); } } return; }
['gcc']
11,217
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_05_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117131/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_05.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_05_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_05_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,218
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_06_bad() { size_t data; /* Initialize data */ data = 0; if(STATIC_CONST_FIVE==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } if(STATIC_CONST_FIVE==5) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117132/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_06.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_06_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_06_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; undefined4 *puStack_28; int iStack_1c; int iStack_18; int iStack_14; ulong uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } if (uStack_10 < 6) { printLine(&UNK_004015e0); } else { puStack_28 = (undefined4 *)func_0x00400d40(uStack_10); *puStack_28 = 0x6c6c6568; *(undefined2 *)(puStack_28 + 1) = 0x6f; printLine(puStack_28); func_0x00400c70(puStack_28); } return; }
['gcc']
11,219
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_06_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117132/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_06.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_06_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_06_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,220
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_07_bad() { size_t data; /* Initialize data */ data = 0; if(staticFive==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } if(staticFive==5) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117133/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_07.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_07_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_07_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; undefined4 *puStack_28; int iStack_1c; int iStack_18; int iStack_14; ulong uStack_10; uStack_10 = 0; if (staticFive == 5) { iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } } if (staticFive == 5) { if (uStack_10 < 6) { printLine(&UNK_004015d8); } else { puStack_28 = (undefined4 *)func_0x00400d40(uStack_10); *puStack_28 = 0x6c6c6568; *(undefined2 *)(puStack_28 + 1) = 0x6f; printLine(puStack_28); func_0x00400c70(puStack_28); } } return; }
['gcc']
11,221
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_07_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117133/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_07.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_07_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_07_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,222
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_08_bad() { size_t data; /* Initialize data */ data = 0; if(staticReturnsTrue()) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } if(staticReturnsTrue()) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117134/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_08.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_08_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_08_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; undefined4 *puStack_28; int iStack_1c; int iStack_18; int iStack_14; ulong uStack_10; uStack_10 = 0; iVar1 = staticReturnsTrue(); if (iVar1 != 0) { iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } } iVar1 = staticReturnsTrue(); if (iVar1 != 0) { if (uStack_10 < 6) { printLine(&UNK_004015e8); } else { puStack_28 = (undefined4 *)func_0x00400d40(uStack_10); *puStack_28 = 0x6c6c6568; *(undefined2 *)(puStack_28 + 1) = 0x6f; printLine(puStack_28); func_0x00400c70(puStack_28); } } return; }
['gcc']
11,223
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_08_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117134/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_08.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_08_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_08_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,224
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_09_bad() { size_t data; /* Initialize data */ data = 0; if(GLOBAL_CONST_TRUE) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } if(GLOBAL_CONST_TRUE) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117135/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_09.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_09_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_09_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; undefined4 *puStack_28; int iStack_1c; int iStack_18; int iStack_14; ulong uStack_10; uStack_10 = 0; if (GLOBAL_CONST_TRUE != 0) { iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } } if (GLOBAL_CONST_TRUE != 0) { if (uStack_10 < 6) { printLine(&UNK_004015d8); } else { puStack_28 = (undefined4 *)func_0x00400d40(uStack_10); *puStack_28 = 0x6c6c6568; *(undefined2 *)(puStack_28 + 1) = 0x6f; printLine(puStack_28); func_0x00400c70(puStack_28); } } return; }
['gcc']
11,225
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_09_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117135/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_09.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_09_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_09_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,226
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_14_bad() { size_t data; /* Initialize data */ data = 0; if(globalFive==5) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } if(globalFive==5) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117140/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_14.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_14_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_14_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; undefined4 *puStack_28; int iStack_1c; int iStack_18; int iStack_14; ulong uStack_10; uStack_10 = 0; if (globalFive == 5) { iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } } if (globalFive == 5) { if (uStack_10 < 6) { printLine(&UNK_004015d8); } else { puStack_28 = (undefined4 *)func_0x00400d40(uStack_10); *puStack_28 = 0x6c6c6568; *(undefined2 *)(puStack_28 + 1) = 0x6f; printLine(puStack_28); func_0x00400c70(puStack_28); } } return; }
['gcc']
11,227
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_14_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117140/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_14.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_14_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_14_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,228
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_15_bad() { size_t data; /* Initialize data */ data = 0; switch(6) { case 6: { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } break; default: /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); break; } switch(7) { case 7: { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } break; default: /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); break; } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117141/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_15.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_15_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_15_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; undefined4 *puStack_28; int iStack_1c; int iStack_18; int iStack_14; ulong uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } if (uStack_10 < 6) { printLine(&UNK_004015b8); } else { puStack_28 = (undefined4 *)func_0x00400d40(uStack_10); *puStack_28 = 0x6c6c6568; *(undefined2 *)(puStack_28 + 1) = 0x6f; printLine(puStack_28); func_0x00400c70(puStack_28); } return; }
['gcc']
11,229
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_15_good() { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117141/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_15.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_15_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_15_good(void) { goodB2G1(); goodB2G2(); goodG2B1(); goodG2B2(); return; }
['gcc']
11,230
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_16_bad() { size_t data; /* Initialize data */ data = 0; while(1) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } break; } while(1) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } break; } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117142/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_16.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_16_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_16_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; undefined4 *puStack_28; int iStack_1c; int iStack_18; int iStack_14; ulong uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } if (uStack_10 < 6) { printLine(&UNK_004015b8); } else { puStack_28 = (undefined4 *)func_0x00400d40(uStack_10); *puStack_28 = 0x6c6c6568; *(undefined2 *)(puStack_28 + 1) = 0x6f; printLine(puStack_28); func_0x00400c70(puStack_28); } return; }
['gcc']
11,231
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_16_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117142/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_16.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_16_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_16_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
11,232
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_17_bad() { int i,j; size_t data; /* Initialize data */ data = 0; for(i = 0; i < 1; i++) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } } for(j = 0; j < 1; j++) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117143/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_17.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_17_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_17_bad(void) { int iVar1; undefined auStack_68 [32]; undefined2 uStack_48; undefined2 uStack_46; undefined4 uStack_44; int iStack_30; int iStack_2c; undefined4 *puStack_28; int iStack_1c; ulong uStack_18; int iStack_10; int iStack_c; uStack_18 = 0; for (iStack_c = 0; iStack_c < 1; iStack_c = iStack_c + 1) { iStack_2c = 0xffffffff; iStack_1c = -1; iStack_2c = func_0x00400dd0(2,1,6); if (iStack_2c != -1) { func_0x00400cd0(&uStack_48,0,0x10); uStack_48 = 2; uStack_44 = 0; uStack_46 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_2c,&uStack_48,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_2c,5), iVar1 != -1)) && (iStack_1c = func_0x00400d90(iStack_2c,0,0), iStack_1c != -1)) && ((iStack_30 = func_0x00400c80(iStack_1c,auStack_68,0x19,0), iStack_30 != -1 && (iStack_30 != 0)))) { auStack_68[iStack_30] = 0; uStack_18 = func_0x00400da0(auStack_68,0,0); } } if (iStack_2c != -1) { func_0x00400ce0(iStack_2c); } if (iStack_1c != -1) { func_0x00400ce0(iStack_1c); } } for (iStack_10 = 0; iStack_10 < 1; iStack_10 = iStack_10 + 1) { if (uStack_18 < 6) { printLine(&UNK_004015e8); } else { puStack_28 = (undefined4 *)func_0x00400d40(uStack_18); *puStack_28 = 0x6c6c6568; *(undefined2 *)(puStack_28 + 1) = 0x6f; printLine(puStack_28); func_0x00400c70(puStack_28); } } return; }
['gcc']
11,233
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_17_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117143/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_17.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_17_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_17_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
11,234
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_18_bad() { size_t data; /* Initialize data */ data = 0; goto source; source: { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } goto sink; sink: { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117144/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_18.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_18_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_18_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; undefined4 *puStack_28; int iStack_1c; int iStack_18; int iStack_14; ulong uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } if (uStack_10 < 6) { printLine(&UNK_004015b8); } else { puStack_28 = (undefined4 *)func_0x00400d40(uStack_10); *puStack_28 = 0x6c6c6568; *(undefined2 *)(puStack_28 + 1) = 0x6f; printLine(puStack_28); func_0x00400c70(puStack_28); } return; }
['gcc']
11,235
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_18_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117144/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_18.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_18_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_18_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
11,236
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_21_bad() { size_t data; /* Initialize data */ data = 0; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } badStatic = 1; /* true */ badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* true */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117145/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_21.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_21_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_21_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; int iStack_1c; int iStack_18; int iStack_14; undefined8 uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } badStatic = 1; badSink(uStack_10); return; }
['gcc']
11,237
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_21_good() { goodB2G1(); goodB2G2(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117145/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_21.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_21_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_21_good(void) { goodB2G1(); goodB2G2(); goodG2B(); return; }
['gcc']
11,238
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_bad() { size_t data; /* Initialize data */ data = 0; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badGlobal = 1; /* true */ CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* true */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117146/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; int iStack_1c; int iStack_18; int iStack_14; undefined8 uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badGlobal = 1; CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badSink(uStack_10); return; }
['gcc']
11,239
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_good() { goodB2G1(); goodB2G2(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117146/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_good(void) { goodB2G1(); goodB2G2(); goodG2B(); return; }
['gcc']
11,240
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badSink(size_t data) { if(CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badGlobal) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117146/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badSink(ulong param_1) { undefined4 *puVar1; if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_badGlobal != 0) { if (param_1 < 6) { printLine(&UNK_004015e8); } else { puVar1 = (undefined4 *)func_0x00400d40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400c70(puVar1); } } return; }
['gcc']
11,241
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G1Sink(size_t data) { if(CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G1Global) { /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); } else { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } } }
['/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117146/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G1Sink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G1Sink(ulong param_1) { undefined4 *puVar1; if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G1Global == 0) { if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_00401890); } else { puVar1 = (undefined4 *)func_0x00400d40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400c70(puVar1); } } else { printLine(&UNK_00401878); } return; }
['gcc']
11,242
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G2Sink(size_t data) { if(CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G2Global) { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117146/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G2Sink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G2Sink(ulong param_1) { undefined4 *puVar1; if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodB2G2Global != 0) { if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_00401890); } else { puVar1 = (undefined4 *)func_0x00400d40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400c70(puVar1); } } return; }
['gcc']
11,243
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodG2BSink(size_t data) { if(CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodG2BGlobal) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117146/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_22_goodG2BGlobal != 0) { if (param_1 < 6) { printLine(&UNK_004018d0); } else { puVar1 = (undefined4 *)func_0x00400d40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400c70(puVar1); } } return; }
['gcc']
11,244
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_31_bad() { size_t data; /* Initialize data */ data = 0; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } { size_t dataCopy = data; size_t data = dataCopy; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117147/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_31.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_31_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_31_bad(void) { int iVar1; undefined auStack_68 [32]; undefined2 uStack_48; undefined2 uStack_46; undefined4 uStack_44; undefined4 *puStack_38; ulong uStack_30; ulong uStack_28; int iStack_1c; int iStack_18; int iStack_14; ulong uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_48,0,0x10); uStack_48 = 2; uStack_44 = 0; uStack_46 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_48,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_68,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_68[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_68,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } uStack_28 = uStack_10; uStack_30 = uStack_10; if (uStack_10 < 6) { printLine(&UNK_004015c8); } else { puStack_38 = (undefined4 *)func_0x00400d40(uStack_10); *puStack_38 = 0x6c6c6568; *(undefined2 *)(puStack_38 + 1) = 0x6f; printLine(puStack_38); func_0x00400c70(puStack_38); } return; }
['gcc']
11,245
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_31_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117147/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_31.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_31_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_31_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,246
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_32_bad() { size_t data; size_t *dataPtr1 = &data; size_t *dataPtr2 = &data; /* Initialize data */ data = 0; { size_t data = *dataPtr1; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } *dataPtr1 = data; } { size_t data = *dataPtr2; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117148/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_32.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_32_bad
/* WARNING: Restarted to delay deadcode elimination for space: stack */ void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_32_bad(void) { int iVar1; undefined auStack_78 [32]; undefined2 uStack_58; undefined2 uStack_56; undefined4 uStack_54; ulong uStack_48; undefined4 *puStack_40; ulong uStack_38; int iStack_30; int iStack_2c; ulong *puStack_28; ulong *puStack_20; int iStack_14; ulong uStack_10; puStack_20 = &uStack_48; puStack_28 = &uStack_48; uStack_48 = 0; uStack_10 = 0; iStack_2c = 0xffffffff; iStack_14 = -1; iStack_2c = func_0x00400dd0(2,1,6); if (iStack_2c != -1) { func_0x00400cd0(&uStack_58,0,0x10); uStack_58 = 2; uStack_54 = 0; uStack_56 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_2c,&uStack_58,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_2c,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_2c,0,0), iStack_14 != -1)) && ((iStack_30 = func_0x00400c80(iStack_14,auStack_78,0x19,0), iStack_30 != -1 && (iStack_30 != 0)))) { auStack_78[iStack_30] = 0; uStack_10 = func_0x00400da0(auStack_78,0,0); } } if (iStack_2c != -1) { func_0x00400ce0(iStack_2c); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } *puStack_20 = uStack_10; uStack_38 = *puStack_28; if (uStack_38 < 6) { printLine(&UNK_004015e8); } else { puStack_40 = (undefined4 *)func_0x00400d40(uStack_38); *puStack_40 = 0x6c6c6568; *(undefined2 *)(puStack_40 + 1) = 0x6f; printLine(puStack_40); func_0x00400c70(puStack_40); } return; }
['gcc']
11,247
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_32_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117148/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_32.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_32_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_32_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,248
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34_bad() { size_t data; CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34_unionType myUnion; /* Initialize data */ data = 0; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } myUnion.unionFirst = data; { size_t data = myUnion.unionSecond; { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117150/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34_bad(void) { int iVar1; undefined auStack_68 [32]; undefined2 uStack_48; undefined2 uStack_46; undefined4 uStack_44; ulong uStack_38; undefined4 *puStack_30; ulong uStack_28; int iStack_1c; int iStack_18; int iStack_14; ulong uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_48,0,0x10); uStack_48 = 2; uStack_44 = 0; uStack_46 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_48,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_68,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_68[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_68,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } uStack_38 = uStack_10; uStack_28 = uStack_10; if (uStack_10 < 6) { printLine(&UNK_004015c8); } else { puStack_30 = (undefined4 *)func_0x00400d40(uStack_10); *puStack_30 = 0x6c6c6568; *(undefined2 *)(puStack_30 + 1) = 0x6f; printLine(puStack_30); func_0x00400c70(puStack_30); } return; }
['gcc']
11,249
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117150/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_34_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,250
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_41_bad() { size_t data; /* Initialize data */ data = 0; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117151/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_41.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_41_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_41_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; int iStack_1c; int iStack_18; int iStack_14; undefined8 uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } badSink(uStack_10); return; }
['gcc']
11,251
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_41_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117151/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_41.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_41_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_41_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
11,252
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_42_bad() { size_t data; /* Initialize data */ data = 0; data = badSource(data); { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* Initialize data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117152/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_42.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_42_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_42_bad(void) { ulong uVar1; undefined4 *puVar2; uVar1 = badSource(0); if (uVar1 < 6) { printLine(&UNK_004015d8); } else { puVar2 = (undefined4 *)func_0x00400d40(uVar1); *puVar2 = 0x6c6c6568; *(undefined2 *)(puVar2 + 1) = 0x6f; printLine(puVar2); func_0x00400c70(puVar2); } return; }
['gcc']
11,253
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_42_good() { goodB2G(); goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117152/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_42.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_42_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_42_good(void) { goodB2G(); goodG2B(); return; }
['gcc']
11,254
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_44_bad() { size_t data; /* define a function pointer */ void (*funcPtr) (size_t) = badSink; /* Initialize data */ data = 0; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } /* use the function pointer */ funcPtr(data); }
['/* define a function pointer */', '/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */', '/* use the function pointer */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117154/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_44.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_44_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_44_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; int iStack_28; int iStack_24; code *pcStack_20; int iStack_14; undefined8 uStack_10; pcStack_20 = badSink; uStack_10 = 0; iStack_24 = 0xffffffff; iStack_14 = -1; iStack_24 = func_0x00400dd0(2,1,6); if (iStack_24 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_24,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_24,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_24,0,0), iStack_14 != -1)) && ((iStack_28 = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_28 != -1 && (iStack_28 != 0)))) { auStack_58[iStack_28] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_24 != -1) { func_0x00400ce0(iStack_24); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } (*pcStack_20)(uStack_10); return; }
['gcc']
11,255
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_44_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117154/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_44.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_44_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_44_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,256
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45_bad() { size_t data; /* Initialize data */ data = 0; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45_badData = data; badSink(); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117155/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; int iStack_1c; int iStack_18; int iStack_14; undefined8 uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45_badData = uStack_10; badSink(); return; }
['gcc']
11,257
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117155/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_45_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,258
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51_bad() { size_t data; /* Initialize data */ data = 0; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117156/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; int iStack_1c; int iStack_18; int iStack_14; undefined8 uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_badSink(uStack_10); return; }
['gcc']
11,259
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117156/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,260
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_badSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117156/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_badSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_004015d8); } else { puVar1 = (undefined4 *)func_0x00400d40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400c70(puVar1); } return; }
['gcc']
11,261
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_goodG2BSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117156/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401678); } else { puVar1 = (undefined4 *)func_0x00400d40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400c70(puVar1); } return; }
['gcc']
11,262
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_goodB2GSink(size_t data) { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117156/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_51b_goodB2GSink(ulong param_1) { undefined4 *puVar1; if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_004016b0); } else { puVar1 = (undefined4 *)func_0x00400d40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400c70(puVar1); } return; }
['gcc']
11,263
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52_bad() { size_t data; /* Initialize data */ data = 0; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117157/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; int iStack_1c; int iStack_18; int iStack_14; undefined8 uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_badSink(uStack_10); return; }
['gcc']
11,264
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117157/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,265
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117157/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_badSink(param_1); return; }
['gcc']
11,266
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117157/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodG2BSink(param_1); return; }
['gcc']
11,267
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117157/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52b_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodB2GSink(param_1); return; }
['gcc']
11,268
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_badSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117157/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_badSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_004015e8); } else { puVar1 = (undefined4 *)func_0x00400d40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400c70(puVar1); } return; }
['gcc']
11,269
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodG2BSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117157/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_004016a8); } else { puVar1 = (undefined4 *)func_0x00400d40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400c70(puVar1); } return; }
['gcc']
11,270
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodB2GSink(size_t data) { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117157/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_52c_goodB2GSink(ulong param_1) { undefined4 *puVar1; if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_004016e0); } else { puVar1 = (undefined4 *)func_0x00400d40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400c70(puVar1); } return; }
['gcc']
11,271
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53_bad() { size_t data; /* Initialize data */ data = 0; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; int iStack_1c; int iStack_18; int iStack_14; undefined8 uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_badSink(uStack_10); return; }
['gcc']
11,272
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,273
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_badSink(param_1); return; }
['gcc']
11,274
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodG2BSink(param_1); return; }
['gcc']
11,275
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53b_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodB2GSink(param_1); return; }
['gcc']
11,276
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_badSink(param_1); return; }
['gcc']
11,277
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodG2BSink(param_1); return; }
['gcc']
11,278
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53c_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodB2GSink(param_1); return; }
['gcc']
11,279
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_badSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_badSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401608); } else { puVar1 = (undefined4 *)func_0x00400d40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400c70(puVar1); } return; }
['gcc']
11,280
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodG2BSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_004016e8); } else { puVar1 = (undefined4 *)func_0x00400d40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400c70(puVar1); } return; }
['gcc']
11,281
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodB2GSink(size_t data) { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117158/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_53d_goodB2GSink(ulong param_1) { undefined4 *puVar1; if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_00401720); } else { puVar1 = (undefined4 *)func_0x00400d40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400c70(puVar1); } return; }
['gcc']
11,282
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54_bad() { size_t data; /* Initialize data */ data = 0; { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_badSink(data); }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54_bad(void) { int iVar1; undefined auStack_58 [32]; undefined2 uStack_38; undefined2 uStack_36; undefined4 uStack_34; int iStack_1c; int iStack_18; int iStack_14; undefined8 uStack_10; uStack_10 = 0; iStack_18 = 0xffffffff; iStack_14 = -1; iStack_18 = func_0x00400dd0(2,1,6); if (iStack_18 != -1) { func_0x00400cd0(&uStack_38,0,0x10); uStack_38 = 2; uStack_34 = 0; uStack_36 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_18,&uStack_38,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_18,5), iVar1 != -1)) && (iStack_14 = func_0x00400d90(iStack_18,0,0), iStack_14 != -1)) && ((iStack_1c = func_0x00400c80(iStack_14,auStack_58,0x19,0), iStack_1c != -1 && (iStack_1c != 0)))) { auStack_58[iStack_1c] = 0; uStack_10 = func_0x00400da0(auStack_58,0,0); } } if (iStack_18 != -1) { func_0x00400ce0(iStack_18); } if (iStack_14 != -1) { func_0x00400ce0(iStack_14); } CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_badSink(uStack_10); return; }
['gcc']
11,283
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,284
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_badSink(param_1); return; }
['gcc']
11,285
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodG2BSink(param_1); return; }
['gcc']
11,286
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54b_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodB2GSink(param_1); return; }
['gcc']
11,287
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_badSink(param_1); return; }
['gcc']
11,288
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodG2BSink(param_1); return; }
['gcc']
11,289
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54c_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodB2GSink(param_1); return; }
['gcc']
11,290
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_badSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_badSink(data); }
[]
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_badSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_badSink(param_1); return; }
['gcc']
11,291
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodG2BSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodG2BSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodG2BSink(param_1); return; }
['gcc']
11,292
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodB2GSink(size_t data) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodB2GSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54d_goodB2GSink(undefined8 param_1) { CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodB2GSink(param_1); return; }
['gcc']
11,293
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_badSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_badSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_badSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401628); } else { puVar1 = (undefined4 *)func_0x00400d40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400c70(puVar1); } return; }
['gcc']
11,294
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodG2BSink(size_t data) { { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodG2BSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodG2BSink(ulong param_1) { undefined4 *puVar1; if (param_1 < 6) { printLine(&UNK_00401718); } else { puVar1 = (undefined4 *)func_0x00400d40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400c70(puVar1); } return; }
['gcc']
11,295
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodB2GSink(size_t data) { { char * myString; /* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING) && data < 100) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string or too large"); } } }
['/* FIX: Include a MAXIMUM limitation for memory allocation and a check to ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117159/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodB2GSink
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_54e_goodB2GSink(ulong param_1) { undefined4 *puVar1; if ((param_1 < 6) || (99 < param_1)) { printLine(&UNK_00401750); } else { puVar1 = (undefined4 *)func_0x00400d40(param_1); *puVar1 = 0x6c6c6568; *(undefined2 *)(puVar1 + 1) = 0x6f; printLine(puVar1); func_0x00400c70(puVar1); } return; }
['gcc']
11,296
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61_bad() { size_t data; /* Initialize data */ data = 0; data = CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b_badSource(data); { char * myString; /* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough * for the strcpy() function to not cause a buffer overflow */ /* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */ if (data > strlen(HELLO_STRING)) { myString = (char *)malloc(data*sizeof(char)); /* Copy a small string into myString */ strcpy(myString, HELLO_STRING); printLine(myString); free(myString); } else { printLine("Input is less than the length of the source string"); } } }
['/* Initialize data */', '/* POTENTIAL FLAW: No MAXIMUM limitation for memory allocation, but ensure data is large enough\r\n * for the strcpy() function to not cause a buffer overflow */', '/* INCIDENTAL FLAW: The source could cause a type overrun in data or in the memory allocation */', '/* Copy a small string into myString */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117160/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61_bad
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61_bad(void) { ulong uVar1; undefined4 *puVar2; uVar1 = CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b_badSource(0); if (uVar1 < 6) { printLine(&UNK_004015d8); } else { puVar2 = (undefined4 *)func_0x00400d40(uVar1); *puVar2 = 0x6c6c6568; *(undefined2 *)(puVar2 + 1) = 0x6f; printLine(puVar2); func_0x00400c70(puVar2); } return; }
['gcc']
11,297
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61_good() { goodG2B(); goodB2G(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117160/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61a.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61_good
void CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61_good(void) { goodG2B(); goodB2G(); return; }
['gcc']
11,298
size_t CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b_badSource(size_t data) { { #ifdef _WIN32 WSADATA wsaData; int wsaDataInit = 0; #endif int recvResult; struct sockaddr_in service; SOCKET listenSocket = INVALID_SOCKET; SOCKET acceptSocket = INVALID_SOCKET; char inputBuffer[CHAR_ARRAY_SIZE]; do { #ifdef _WIN32 if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR) { break; } wsaDataInit = 1; #endif /* POTENTIAL FLAW: Read data using a listen socket */ listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (listenSocket == INVALID_SOCKET) { break; } memset(&service, 0, sizeof(service)); service.sin_family = AF_INET; service.sin_addr.s_addr = INADDR_ANY; service.sin_port = htons(TCP_PORT); if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR) { break; } if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR) { break; } acceptSocket = accept(listenSocket, NULL, NULL); if (acceptSocket == SOCKET_ERROR) { break; } /* Abort on error or the connection was closed */ recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0); if (recvResult == SOCKET_ERROR || recvResult == 0) { break; } /* NUL-terminate the string */ inputBuffer[recvResult] = '\0'; /* Convert to unsigned int */ data = strtoul(inputBuffer, NULL, 0); } while (0); if (listenSocket != INVALID_SOCKET) { CLOSE_SOCKET(listenSocket); } if (acceptSocket != INVALID_SOCKET) { CLOSE_SOCKET(acceptSocket); } #ifdef _WIN32 if (wsaDataInit) { WSACleanup(); } #endif } return data; }
['/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to unsigned int */']
['CWE789']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117160/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b_badSource
undefined8 CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b_badSource(undefined8 param_1) { int iVar1; undefined8 uStack_50; undefined auStack_48 [32]; undefined2 uStack_28; undefined2 uStack_26; undefined4 uStack_24; int iStack_14; int iStack_10; int iStack_c; iStack_10 = 0xffffffff; iStack_c = -1; iStack_10 = func_0x00400dd0(2,1,6); uStack_50 = param_1; if (iStack_10 != -1) { func_0x00400cd0(&uStack_28,0,0x10); uStack_28 = 2; uStack_24 = 0; uStack_26 = func_0x00400cb0(0x6987); iVar1 = func_0x00400d80(iStack_10,&uStack_28,0x10); if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_10,5), iVar1 != -1)) && (iStack_c = func_0x00400d90(iStack_10,0,0), iStack_c != -1)) && ((iStack_14 = func_0x00400c80(iStack_c,auStack_48,0x19,0), iStack_14 != -1 && (iStack_14 != 0)))) { auStack_48[iStack_14] = 0; uStack_50 = func_0x00400da0(auStack_48,0,0); } } if (iStack_10 != -1) { func_0x00400ce0(iStack_10); } if (iStack_c != -1) { func_0x00400ce0(iStack_c); } return uStack_50; }
['gcc']
11,299
size_t CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b_goodG2BSource(size_t data) { /* FIX: Use a relatively small number for memory allocation */ data = 20; return data; }
['/* FIX: Use a relatively small number for memory allocation */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/117160/CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b.c
CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b_goodG2BSource
undefined8 CWE789_Uncontrolled_Mem_Alloc__malloc_char_listen_socket_61b_goodG2BSource(void) { return 0x14; }
['gcc']