Unnamed: 0
int64
0
56k
source_code
stringlengths
55
5.98k
comments
stringlengths
2
1.76k
label
stringclasses
68 values
dataset_name
stringclasses
1 value
file_name
stringlengths
208
265
function
stringlengths
27
87
decompiled_code
stringlengths
68
3.97k
compiler_options
stringclasses
1 value
7,300
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_08_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110415/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_08.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_08_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_08_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,301
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_09_bad() { int data; /* Initialize data */ data = -1; if(GLOBAL_CONST_TRUE) { /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110416/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_09.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_09_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_09_bad(void) { undefined4 *puVar1; ulong uStack_18; int iStack_c; iStack_c = -1; if (GLOBAL_CONST_TRUE != 0) { iStack_c = 0x40000001; } puVar1 = (undefined4 *)func_0x00400ab0((long)iStack_c << 2); for (uStack_18 = 0; uStack_18 < (ulong)(long)iStack_c; uStack_18 = uStack_18 + 1) { puVar1[uStack_18] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,302
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_09_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110416/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_09.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_09_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_09_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,303
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_10_bad() { int data; /* Initialize data */ data = -1; if(globalTrue) { /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110417/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_10.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_10_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_10_bad(void) { undefined4 *puVar1; ulong uStack_18; int iStack_c; iStack_c = -1; if (globalTrue != 0) { iStack_c = 0x40000001; } puVar1 = (undefined4 *)func_0x00400ab0((long)iStack_c << 2); for (uStack_18 = 0; uStack_18 < (ulong)(long)iStack_c; uStack_18 = uStack_18 + 1) { puVar1[uStack_18] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,304
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_10_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110417/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_10.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_10_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_10_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,305
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_11_bad() { int data; /* Initialize data */ data = -1; if(globalReturnsTrue()) { /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110418/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_11.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_11_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_11_bad(void) { int iVar1; undefined4 *puVar2; ulong uStack_18; int iStack_c; iStack_c = -1; iVar1 = globalReturnsTrue(); if (iVar1 != 0) { iStack_c = 0x40000001; } puVar2 = (undefined4 *)func_0x00400ab0((long)iStack_c << 2); for (uStack_18 = 0; uStack_18 < (ulong)(long)iStack_c; uStack_18 = uStack_18 + 1) { puVar2[uStack_18] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,306
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_11_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110418/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_11.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_11_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_11_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,307
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_12_bad() { int data; /* Initialize data */ data = -1; if(globalReturnsTrueOrFalse()) { /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ } else { /* FIX: Set data to a relatively small number greater than zero */ data = 20; } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */', '/* FIX: Set data to a relatively small number greater than zero */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110419/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_12.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_12_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_12_bad(void) { int iVar1; undefined4 *puVar2; ulong uStack_18; int iStack_c; iVar1 = globalReturnsTrueOrFalse(); if (iVar1 == 0) { iStack_c = 0x14; } else { iStack_c = 0x40000001; } puVar2 = (undefined4 *)func_0x00400ab0((long)iStack_c << 2); for (uStack_18 = 0; uStack_18 < (ulong)(long)iStack_c; uStack_18 = uStack_18 + 1) { puVar2[uStack_18] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,308
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_12_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110419/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_12.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_12_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_12_good(void) { goodG2B(); return; }
['gcc']
7,309
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_13_bad() { int data; /* Initialize data */ data = -1; if(GLOBAL_CONST_FIVE==5) { /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110420/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_13.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_13_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_13_bad(void) { undefined4 *puVar1; ulong uStack_18; int iStack_c; iStack_c = -1; if (GLOBAL_CONST_FIVE == 5) { iStack_c = 0x40000001; } puVar1 = (undefined4 *)func_0x00400ab0((long)iStack_c << 2); for (uStack_18 = 0; uStack_18 < (ulong)(long)iStack_c; uStack_18 = uStack_18 + 1) { puVar1[uStack_18] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,310
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_13_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110420/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_13.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_13_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_13_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,311
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_14_bad() { int data; /* Initialize data */ data = -1; if(globalFive==5) { /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110421/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_14.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_14_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_14_bad(void) { undefined4 *puVar1; ulong uStack_18; int iStack_c; iStack_c = -1; if (globalFive == 5) { iStack_c = 0x40000001; } puVar1 = (undefined4 *)func_0x00400ab0((long)iStack_c << 2); for (uStack_18 = 0; uStack_18 < (ulong)(long)iStack_c; uStack_18 = uStack_18 + 1) { puVar1[uStack_18] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,312
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_14_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110421/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_14.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_14_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_14_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,313
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_15_bad() { int data; /* Initialize data */ data = -1; switch(6) { case 6: /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ break; default: /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); break; } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110422/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_15.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_15_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_15_bad(void) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0(0x100000004); for (uStack_10 = 0; uStack_10 < 0x40000001; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,314
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_15_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110422/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_15.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_15_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_15_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,315
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_16_bad() { int data; /* Initialize data */ data = -1; while(1) { /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ break; } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110423/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_16.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_16_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_16_bad(void) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0(0x100000004); for (uStack_10 = 0; uStack_10 < 0x40000001; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,316
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_16_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110423/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_16.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_16_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_16_good(void) { goodG2B(); return; }
['gcc']
7,317
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_17_bad() { int i; int data; /* Initialize data */ data = -1; for(i = 0; i < 1; i++) { /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110424/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_17.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_17_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_17_bad(void) { undefined4 *puVar1; ulong uStack_18; int iStack_10; int iStack_c; iStack_10 = -1; for (iStack_c = 0; iStack_c < 1; iStack_c = iStack_c + 1) { iStack_10 = 0x40000001; } puVar1 = (undefined4 *)func_0x00400ab0((long)iStack_10 << 2); for (uStack_18 = 0; uStack_18 < (ulong)(long)iStack_10; uStack_18 = uStack_18 + 1) { puVar1[uStack_18] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,318
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_17_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110424/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_17.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_17_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_17_good(void) { goodG2B(); return; }
['gcc']
7,319
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_18_bad() { int data; /* Initialize data */ data = -1; goto source; source: /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110425/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_18.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_18_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_18_bad(void) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0(0x100000004); for (uStack_10 = 0; uStack_10 < 0x40000001; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,320
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_18_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110425/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_18.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_18_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_18_good(void) { goodG2B(); return; }
['gcc']
7,321
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_21_bad() { int data; /* Initialize data */ data = -1; badStatic = 1; /* true */ data = badSource(data); { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* true */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110426/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_21.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_21_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_21_bad(void) { int iVar1; undefined4 *puVar2; ulong uStack_10; badStatic = 1; iVar1 = badSource(0xffffffff); puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,322
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_21_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110426/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_21.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_21_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_21_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,323
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_bad() { int data; /* Initialize data */ data = -1; CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_badGlobal = 1; /* true */ data = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_badSource(data); { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* true */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110427/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_bad(void) { int iVar1; undefined4 *puVar2; ulong uStack_10; CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_badGlobal = 1; iVar1 = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_badSource(0xffffffff); puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,324
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110427/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,325
int CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_badSource(int data) { if(CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_badGlobal) { /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ } return data; }
['/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110427/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_badSource
undefined4 CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_badSource(undefined4 param_1) { undefined4 uStack_c; uStack_c = param_1; if (CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_badGlobal != 0) { uStack_c = 0x40000001; } return uStack_c; }
['gcc']
7,326
int CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_goodG2B1Source(int data) { if(CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_goodG2B1Global) { /* INCIDENTAL: CWE 561 Dead Code, the code below will never run */ printLine("Benign, fixed string"); } else { /* FIX: Set data to a relatively small number greater than zero */ data = 20; } return data; }
['/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* FIX: Set data to a relatively small number greater than zero */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110427/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_goodG2B1Source
undefined4 CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_goodG2B1Source(undefined4 param_1) { undefined4 uStack_c; if (CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_goodG2B1Global == 0) { uStack_c = 0x14; } else { printLine(&UNK_004012c4); uStack_c = param_1; } return uStack_c; }
['gcc']
7,327
int CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_goodG2B2Source(int data) { if(CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_goodG2B2Global) { /* FIX: Set data to a relatively small number greater than zero */ data = 20; } return data; }
['/* FIX: Set data to a relatively small number greater than zero */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110427/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_goodG2B2Source
undefined4 CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_goodG2B2Source(undefined4 param_1) { undefined4 uStack_c; uStack_c = param_1; if (CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_22_goodG2B2Global != 0) { uStack_c = 0x14; } return uStack_c; }
['gcc']
7,328
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_31_bad() { int data; /* Initialize data */ data = -1; /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ { int dataCopy = data; int data = dataCopy; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } } }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110428/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_31.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_31_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_31_bad(void) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0(0x100000004); for (uStack_10 = 0; uStack_10 < 0x40000001; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,329
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_31_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110428/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_31.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_31_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_31_good(void) { goodG2B(); return; }
['gcc']
7,330
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_32_bad() { int data; int *dataPtr1 = &data; int *dataPtr2 = &data; /* Initialize data */ data = -1; { int data = *dataPtr1; /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ *dataPtr1 = data; } { int data = *dataPtr2; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } } }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110429/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_32.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_32_bad
/* WARNING: Heritage AFTER dead removal. Example location: s0xffffffffffffffcc : 0x00400c0e */ /* WARNING: Restarted to delay deadcode elimination for space: stack */ void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_32_bad(void) { undefined4 uStack_34; undefined4 *puStack_30; int iStack_28; undefined4 uStack_24; undefined4 *puStack_20; undefined4 *puStack_18; ulong uStack_10; puStack_18 = &uStack_34; puStack_20 = &uStack_34; uStack_24 = 0x40000001; uStack_34 = 0x40000001; iStack_28 = 0x40000001; puStack_30 = (undefined4 *)func_0x00400ab0(0x100000004); for (uStack_10 = 0; uStack_10 < (ulong)(long)iStack_28; uStack_10 = uStack_10 + 1) { puStack_30[uStack_10] = 0; } printIntLine(*puStack_30); func_0x00400a20(puStack_30); return; }
['gcc']
7,331
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_32_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110429/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_32.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_32_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_32_good(void) { goodG2B(); return; }
['gcc']
7,332
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_34_bad() { int data; CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_34_unionType myUnion; /* Initialize data */ data = -1; /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ myUnion.unionFirst = data; { int data = myUnion.unionSecond; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } } }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110431/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_34.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_34_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_34_bad(void) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0(0x100000004); for (uStack_10 = 0; uStack_10 < 0x40000001; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,333
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_34_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110431/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_34.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_34_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_34_good(void) { goodG2B(); return; }
['gcc']
7,334
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41_badSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110432/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41_badSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,335
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41_bad() { int data; /* Initialize data */ data = -1; /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41_badSink(data); }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110432/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41_bad(void) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41_badSink(0x40000001); return; }
['gcc']
7,336
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41_goodG2BSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110432/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41_goodG2BSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,337
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110432/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_41_good(void) { goodG2B(); return; }
['gcc']
7,338
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_42_bad() { int data; /* Initialize data */ data = -1; data = badSource(data); { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110433/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_42.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_42_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_42_bad(void) { int iVar1; undefined4 *puVar2; ulong uStack_10; iVar1 = badSource(0xffffffff); puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,339
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_42_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110433/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_42.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_42_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_42_good(void) { goodG2B(); return; }
['gcc']
7,340
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51_bad() { int data; /* Initialize data */ data = -1; /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51b_badSink(data); }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110437/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51_bad(void) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51b_badSink(0x40000001); return; }
['gcc']
7,341
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110437/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51_good(void) { goodG2B(); return; }
['gcc']
7,342
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51b_badSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110437/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51b_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51b_badSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,343
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51b_goodG2BSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110437/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51b_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_51b_goodG2BSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,344
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52_bad() { int data; /* Initialize data */ data = -1; /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52b_badSink(data); }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110438/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52_bad(void) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52b_badSink(0x40000001); return; }
['gcc']
7,345
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110438/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52_good(void) { goodG2B(); return; }
['gcc']
7,346
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52b_badSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52c_badSink(data); }
[]
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110438/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52b_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52b_badSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52c_badSink(param_1); return; }
['gcc']
7,347
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52b_goodG2BSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110438/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52b_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52b_goodG2BSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52c_goodG2BSink(param_1); return; }
['gcc']
7,348
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52c_badSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110438/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52c.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52c_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52c_badSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,349
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52c_goodG2BSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110438/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52c.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52c_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_52c_goodG2BSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,350
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53_bad() { int data; /* Initialize data */ data = -1; /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53b_badSink(data); }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110439/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53_bad(void) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53b_badSink(0x40000001); return; }
['gcc']
7,351
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110439/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53_good(void) { goodG2B(); return; }
['gcc']
7,352
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53b_badSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53c_badSink(data); }
[]
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110439/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53b_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53b_badSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53c_badSink(param_1); return; }
['gcc']
7,353
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53b_goodG2BSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110439/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53b_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53b_goodG2BSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53c_goodG2BSink(param_1); return; }
['gcc']
7,354
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53c_badSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53d_badSink(data); }
[]
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110439/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53c.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53c_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53c_badSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53d_badSink(param_1); return; }
['gcc']
7,355
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53c_goodG2BSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53d_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110439/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53c.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53c_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53c_goodG2BSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53d_goodG2BSink(param_1); return; }
['gcc']
7,356
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53d_badSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110439/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53d.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53d_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53d_badSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,357
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53d_goodG2BSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110439/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53d.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53d_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_53d_goodG2BSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,358
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54_bad() { int data; /* Initialize data */ data = -1; /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54b_badSink(data); }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110440/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54_bad(void) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54b_badSink(0x40000001); return; }
['gcc']
7,359
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110440/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54_good(void) { goodG2B(); return; }
['gcc']
7,360
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54b_badSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54c_badSink(data); }
[]
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110440/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54b_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54b_badSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54c_badSink(param_1); return; }
['gcc']
7,361
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54b_goodG2BSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54c_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110440/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54b_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54b_goodG2BSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54c_goodG2BSink(param_1); return; }
['gcc']
7,362
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54c_badSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54d_badSink(data); }
[]
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110440/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54c.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54c_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54c_badSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54d_badSink(param_1); return; }
['gcc']
7,363
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54c_goodG2BSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54d_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110440/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54c.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54c_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54c_goodG2BSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54d_goodG2BSink(param_1); return; }
['gcc']
7,364
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54d_badSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54e_badSink(data); }
[]
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110440/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54d.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54d_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54d_badSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54e_badSink(param_1); return; }
['gcc']
7,365
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54d_goodG2BSink(int data) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54e_goodG2BSink(data); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110440/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54d.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54d_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54d_goodG2BSink(undefined4 param_1) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54e_goodG2BSink(param_1); return; }
['gcc']
7,366
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54e_badSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110440/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54e.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54e_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54e_badSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,367
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54e_goodG2BSink(int data) { { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110440/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54e.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54e_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_54e_goodG2BSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,368
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61_bad() { int data; /* Initialize data */ data = -1; data = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61b_badSource(data); { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110441/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61_bad(void) { int iVar1; undefined4 *puVar2; ulong uStack_10; iVar1 = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61b_badSource(0xffffffff); puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,369
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110441/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61_good(void) { goodG2B(); return; }
['gcc']
7,370
int CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61b_badSource(int data) { /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ return data; }
['/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110441/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61b_badSource
undefined4 CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61b_badSource(void) { return 0x40000001; }
['gcc']
7,371
int CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61b_goodG2BSource(int data) { /* FIX: Set data to a relatively small number greater than zero */ data = 20; return data; }
['/* FIX: Set data to a relatively small number greater than zero */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110441/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61b_goodG2BSource
undefined4 CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_61b_goodG2BSource(void) { return 0x14; }
['gcc']
7,372
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63_bad() { int data; /* Initialize data */ data = -1; /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63b_badSink(&data); }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110443/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63_bad(void) { undefined4 uStack_c; uStack_c = 0x40000001; CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63b_badSink(&uStack_c); return; }
['gcc']
7,373
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110443/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63_good(void) { goodG2B(); return; }
['gcc']
7,374
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63b_badSink(int * dataPtr) { int data = *dataPtr; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110443/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63b_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63b_badSink(int *param_1) { int iVar1; undefined4 *puVar2; ulong uStack_10; iVar1 = *param_1; puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,375
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63b_goodG2BSink(int * dataPtr) { int data = *dataPtr; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110443/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63b_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_63b_goodG2BSink(int *param_1) { int iVar1; undefined4 *puVar2; ulong uStack_10; iVar1 = *param_1; puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,376
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64_bad() { int data; /* Initialize data */ data = -1; /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64b_badSink(&data); }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110444/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64_bad(void) { undefined4 uStack_c; uStack_c = 0x40000001; CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64b_badSink(&uStack_c); return; }
['gcc']
7,377
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110444/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64_good(void) { goodG2B(); return; }
['gcc']
7,378
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64b_badSink(void * dataVoidPtr) { /* cast void pointer to a pointer of the appropriate type */ int * dataPtr = (int *)dataVoidPtr; /* dereference dataPtr into data */ int data = (*dataPtr); { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110444/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64b_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64b_badSink(int *param_1) { int iVar1; undefined4 *puVar2; ulong uStack_10; iVar1 = *param_1; puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,379
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64b_goodG2BSink(void * dataVoidPtr) { /* cast void pointer to a pointer of the appropriate type */ int * dataPtr = (int *)dataVoidPtr; /* dereference dataPtr into data */ int data = (*dataPtr); { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110444/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64b_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_64b_goodG2BSink(int *param_1) { int iVar1; undefined4 *puVar2; ulong uStack_10; iVar1 = *param_1; puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,380
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66_bad() { int data; int dataArray[5]; /* Initialize data */ data = -1; /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ /* put data in array */ dataArray[2] = data; CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66b_badSink(dataArray); }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */', '/* put data in array */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110446/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66_bad(void) { undefined auStack_28 [8]; undefined4 uStack_20; undefined4 uStack_c; uStack_c = 0x40000001; uStack_20 = 0x40000001; CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66b_badSink(auStack_28); return; }
['gcc']
7,381
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110446/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66_good(void) { goodG2B(); return; }
['gcc']
7,382
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66b_badSink(int dataArray[]) { /* copy data out of dataArray */ int data = dataArray[2]; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* copy data out of dataArray */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110446/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66b_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66b_badSink(long param_1) { int iVar1; undefined4 *puVar2; ulong uStack_10; iVar1 = *(int *)(param_1 + 8); puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,383
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66b_goodG2BSink(int dataArray[]) { int data = dataArray[2]; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110446/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66b_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_66b_goodG2BSink(long param_1) { int iVar1; undefined4 *puVar2; ulong uStack_10; iVar1 = *(int *)(param_1 + 8); puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) { puVar2[uStack_10] = 0; } printIntLine(*puVar2); func_0x00400a20(puVar2); return; }
['gcc']
7,384
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67_bad() { int data; CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67_structType myStruct; /* Initialize data */ data = -1; /* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */ data = INT_MAX / 2 + 2; /* 1073741825 */ /* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however * the for loop will attempt to access indices 0-1073741824 */ myStruct.structFirst = data; CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67b_badSink(myStruct); }
['/* Initialize data */', '/* FLAW: Set data to a value that will cause an integer overflow in the call to malloc() in the sink */', '/* 1073741825 */', '/* NOTE: This value will cause the sink to only allocate 4 bytes of memory, however\r\n * the for loop will attempt to access indices 0-1073741824 */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110447/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67_bad(void) { CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67b_badSink(0x40000001); return; }
['gcc']
7,385
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110447/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67a.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67_good(void) { goodG2B(); return; }
['gcc']
7,386
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67b_badSink(CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67_structType myStruct) { int data = myStruct.structFirst; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110447/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67b_badSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67b_badSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,387
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67b_goodG2BSink(CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67_structType myStruct) { int data = myStruct.structFirst; { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110447/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67b.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67b_goodG2BSink
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fixed_67b_goodG2BSink(int param_1) { undefined4 *puVar1; ulong uStack_10; puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) { puVar1[uStack_10] = 0; } printIntLine(*puVar1); func_0x00400a20(puVar1); return; }
['gcc']
7,388
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_01_bad() { int data; /* Initialize data */ data = -1; /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%d", &data); { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110456/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_01.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_01_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_01_bad(void) { int iStack_1c; undefined4 *puStack_18; ulong uStack_10; iStack_1c = -1; func_0x00400ab0(stdin,&UNK_00401274,&iStack_1c); puStack_18 = (undefined4 *)func_0x00400b40((long)iStack_1c << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iStack_1c; uStack_10 = uStack_10 + 1) { puStack_18[uStack_10] = 0; } printIntLine(*puStack_18); func_0x00400aa0(puStack_18); return; }
['gcc']
7,389
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_01_good() { goodG2B(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110456/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_01.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_01_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_01_good(void) { goodG2B(); return; }
['gcc']
7,390
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_02_bad() { int data; /* Initialize data */ data = -1; if(1) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%d", &data); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110457/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_02.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_02_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_02_bad(void) { int iStack_1c; undefined4 *puStack_18; ulong uStack_10; iStack_1c = -1; func_0x00400ab0(stdin,&UNK_00401274,&iStack_1c); puStack_18 = (undefined4 *)func_0x00400b40((long)iStack_1c << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iStack_1c; uStack_10 = uStack_10 + 1) { puStack_18[uStack_10] = 0; } printIntLine(*puStack_18); func_0x00400aa0(puStack_18); return; }
['gcc']
7,391
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_02_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110457/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_02.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_02_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_02_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,392
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_03_bad() { int data; /* Initialize data */ data = -1; if(5==5) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%d", &data); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110458/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_03.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_03_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_03_bad(void) { int iStack_1c; undefined4 *puStack_18; ulong uStack_10; iStack_1c = -1; func_0x00400ab0(stdin,&UNK_00401274,&iStack_1c); puStack_18 = (undefined4 *)func_0x00400b40((long)iStack_1c << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iStack_1c; uStack_10 = uStack_10 + 1) { puStack_18[uStack_10] = 0; } printIntLine(*puStack_18); func_0x00400aa0(puStack_18); return; }
['gcc']
7,393
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_03_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110458/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_03.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_03_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_03_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,394
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_04_bad() { int data; /* Initialize data */ data = -1; if(STATIC_CONST_TRUE) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%d", &data); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110459/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_04.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_04_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_04_bad(void) { int iStack_1c; undefined4 *puStack_18; ulong uStack_10; iStack_1c = -1; func_0x00400ab0(stdin,&UNK_0040127c,&iStack_1c); puStack_18 = (undefined4 *)func_0x00400b40((long)iStack_1c << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iStack_1c; uStack_10 = uStack_10 + 1) { puStack_18[uStack_10] = 0; } printIntLine(*puStack_18); func_0x00400aa0(puStack_18); return; }
['gcc']
7,395
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_04_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110459/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_04.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_04_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_04_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,396
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_05_bad() { int data; /* Initialize data */ data = -1; if(staticTrue) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%d", &data); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110460/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_05.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_05_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_05_bad(void) { int iStack_1c; undefined4 *puStack_18; ulong uStack_10; iStack_1c = -1; if (staticTrue != 0) { func_0x00400ab0(stdin,&UNK_00401274,&iStack_1c); } puStack_18 = (undefined4 *)func_0x00400b40((long)iStack_1c << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iStack_1c; uStack_10 = uStack_10 + 1) { puStack_18[uStack_10] = 0; } printIntLine(*puStack_18); func_0x00400aa0(puStack_18); return; }
['gcc']
7,397
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_05_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110460/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_05.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_05_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_05_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']
7,398
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_06_bad() { int data; /* Initialize data */ data = -1; if(STATIC_CONST_FIVE==5) { /* POTENTIAL FLAW: Read data from the console using fscanf() */ fscanf(stdin, "%d", &data); } { size_t i; int *intPointer; /* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value * so that the for loop doing the initialization causes a buffer overflow */ intPointer = (int*)malloc(data * sizeof(int)); for (i = 0; i < (size_t)data; i++) { intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */ } printIntLine(intPointer[0]); free(intPointer); } }
['/* Initialize data */', '/* POTENTIAL FLAW: Read data from the console using fscanf() */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */']
['CWE680']
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110461/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_06.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_06_bad
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_06_bad(void) { int iStack_1c; undefined4 *puStack_18; ulong uStack_10; iStack_1c = -1; func_0x00400ab0(stdin,&UNK_00401278,&iStack_1c); puStack_18 = (undefined4 *)func_0x00400b40((long)iStack_1c << 2); for (uStack_10 = 0; uStack_10 < (ulong)(long)iStack_1c; uStack_10 = uStack_10 + 1) { puStack_18[uStack_10] = 0; } printIntLine(*puStack_18); func_0x00400aa0(puStack_18); return; }
['gcc']
7,399
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_06_good() { goodG2B1(); goodG2B2(); }
[]
null
mvd
/work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110461/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_06.c
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_06_good
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_fscanf_06_good(void) { goodG2B1(); goodG2B2(); return; }
['gcc']