Unnamed: 0 int64 0 56k | source_code stringlengths 55 5.98k | comments stringlengths 2 1.76k | label stringclasses 68 values | dataset_name stringclasses 1 value | file_name stringlengths 208 265 | function stringlengths 27 87 | decompiled_code stringlengths 68 3.97k | compiler_options stringclasses 1 value |
|---|---|---|---|---|---|---|---|---|
7,600 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67b_badSink(CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67_structType myStruct)
{
int data = myStruct.structFirst;
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110543/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67b_badSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67b_badSink(int param_1)
{
undefined4 *puVar1;
ulong uStack_10;
puVar1 = (undefined4 *)func_0x00400d40((long)param_1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) {
puVar1[uStack_10] = 0;
}
printIntLine(*puVar1);
func_0x00400c70(puVar1);
return;
}
| ['gcc'] |
7,601 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67b_goodG2BSink(CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67_structType myStruct)
{
int data = myStruct.structFirst;
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110543/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67b_goodG2BSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_67b_goodG2BSink(int param_1)
{
undefined4 *puVar1;
ulong uStack_10;
puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) {
puVar1[uStack_10] = 0;
}
printIntLine(*puVar1);
func_0x00400a20(puVar1);
return;
}
| ['gcc'] |
7,602 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_bad()
{
int data;
/* Initialize data */
data = -1;
{
#ifdef _WIN32
WSADATA wsaData;
int wsaDataInit = 0;
#endif
int recvResult;
struct sockaddr_in service;
SOCKET listenSocket = INVALID_SOCKET;
SOCKET acceptSocket = INVALID_SOCKET;
char inputBuffer[CHAR_ARRAY_SIZE];
do
{
#ifdef _WIN32
if (WSAStartup(MAKEWORD(2,2), &wsaData) != NO_ERROR)
{
break;
}
wsaDataInit = 1;
#endif
/* POTENTIAL FLAW: Read data using a listen socket */
listenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (listenSocket == INVALID_SOCKET)
{
break;
}
memset(&service, 0, sizeof(service));
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(TCP_PORT);
if (bind(listenSocket, (struct sockaddr*)&service, sizeof(service)) == SOCKET_ERROR)
{
break;
}
if (listen(listenSocket, LISTEN_BACKLOG) == SOCKET_ERROR)
{
break;
}
acceptSocket = accept(listenSocket, NULL, NULL);
if (acceptSocket == SOCKET_ERROR)
{
break;
}
/* Abort on error or the connection was closed */
recvResult = recv(acceptSocket, inputBuffer, CHAR_ARRAY_SIZE - 1, 0);
if (recvResult == SOCKET_ERROR || recvResult == 0)
{
break;
}
/* NUL-terminate the string */
inputBuffer[recvResult] = '\0';
/* Convert to int */
data = atoi(inputBuffer);
}
while (0);
if (listenSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(listenSocket);
}
if (acceptSocket != INVALID_SOCKET)
{
CLOSE_SOCKET(acceptSocket);
}
#ifdef _WIN32
if (wsaDataInit)
{
WSACleanup();
}
#endif
}
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_badData = data;
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b_badSink();
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Read data using a listen socket */', '/* Abort on error or the connection was closed */', '/* NUL-terminate the string */', '/* Convert to int */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110544/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_bad(void)
{
int iVar1;
undefined auStack_36 [14];
undefined2 uStack_28;
undefined2 uStack_26;
undefined4 uStack_24;
int iStack_18;
int iStack_14;
int iStack_10;
undefined4 uStack_c;
uStack_c = 0xffffffff;
iStack_14 = 0xffffffff;
iStack_10 = -1;
iStack_14 = func_0x00400dd0(2,1,6);
if (iStack_14 != -1) {
func_0x00400cd0(&uStack_28,0,0x10);
uStack_28 = 2;
uStack_24 = 0;
uStack_26 = func_0x00400cb0(0x6987);
iVar1 = func_0x00400d80(iStack_14,&uStack_28,0x10);
if ((((iVar1 != -1) && (iVar1 = func_0x00400d70(iStack_14,5), iVar1 != -1)) &&
(iStack_10 = func_0x00400d90(iStack_14,0,0), iStack_10 != -1)) &&
((iStack_18 = func_0x00400c80(iStack_10,auStack_36,0xd,0), iStack_18 != -1 &&
(iStack_18 != 0)))) {
auStack_36[iStack_18] = 0;
uStack_c = func_0x00400da0(auStack_36);
}
}
if (iStack_14 != -1) {
func_0x00400ce0(iStack_14);
}
if (iStack_10 != -1) {
func_0x00400ce0(iStack_10);
}
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_badData = uStack_c;
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b_badSink();
return;
}
| ['gcc'] |
7,603 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110544/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,604 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b_badSink()
{
int data = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_badData;
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110544/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b_badSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b_badSink(void)
{
int iVar1;
undefined4 *puVar2;
ulong uStack_10;
iVar1 = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_badData;
puVar2 = (undefined4 *)
func_0x00400d40((long)
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_badData
<< 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) {
puVar2[uStack_10] = 0;
}
printIntLine(*puVar2);
func_0x00400c70(puVar2);
return;
}
| ['gcc'] |
7,605 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b_goodG2BSink()
{
int data = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_goodG2BData;
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110544/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b_goodG2BSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68b_goodG2BSink(void)
{
int iVar1;
undefined4 *puVar2;
ulong uStack_10;
iVar1 = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_goodG2BData;
puVar2 = (undefined4 *)
func_0x00400ab0((long)
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_listen_socket_68_goodG2BData
<< 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) {
puVar2[uStack_10] = 0;
}
printIntLine(*puVar2);
func_0x00400a20(puVar2);
return;
}
| ['gcc'] |
7,606 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_01_bad()
{
int data;
/* Initialize data */
data = -1;
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110552/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_01.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_01_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_01_bad(void)
{
int iVar1;
int iVar2;
uint uVar3;
undefined4 *puVar4;
ulong uStack_20;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uVar3 = func_0x00400ae0();
uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf;
puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2);
for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uVar3; uStack_20 = uStack_20 + 1) {
puVar4[uStack_20] = 0;
}
printIntLine(*puVar4);
func_0x00400a20(puVar4);
return;
}
| ['gcc'] |
7,607 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_01_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110552/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_01.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_01_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_01_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,608 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_02_bad()
{
int data;
/* Initialize data */
data = -1;
if(1)
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
}
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110553/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_02.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_02_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_02_bad(void)
{
int iVar1;
int iVar2;
uint uVar3;
undefined4 *puVar4;
ulong uStack_20;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uVar3 = func_0x00400ae0();
uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf;
puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2);
for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uVar3; uStack_20 = uStack_20 + 1) {
puVar4[uStack_20] = 0;
}
printIntLine(*puVar4);
func_0x00400a20(puVar4);
return;
}
| ['gcc'] |
7,609 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_02_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110553/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_02.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_02_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_02_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
7,610 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_03_bad()
{
int data;
/* Initialize data */
data = -1;
if(5==5)
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
}
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110554/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_03.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_03_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_03_bad(void)
{
int iVar1;
int iVar2;
uint uVar3;
undefined4 *puVar4;
ulong uStack_20;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uVar3 = func_0x00400ae0();
uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf;
puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2);
for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uVar3; uStack_20 = uStack_20 + 1) {
puVar4[uStack_20] = 0;
}
printIntLine(*puVar4);
func_0x00400a20(puVar4);
return;
}
| ['gcc'] |
7,611 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_03_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110554/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_03.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_03_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_03_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
7,612 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_04_bad()
{
int data;
/* Initialize data */
data = -1;
if(STATIC_CONST_TRUE)
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
}
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110555/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_04.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_04_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_04_bad(void)
{
int iVar1;
int iVar2;
uint uVar3;
undefined4 *puVar4;
ulong uStack_28;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uVar3 = func_0x00400ae0();
uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf;
puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2);
for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uVar3; uStack_28 = uStack_28 + 1) {
puVar4[uStack_28] = 0;
}
printIntLine(*puVar4);
func_0x00400a20(puVar4);
return;
}
| ['gcc'] |
7,613 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_04_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110555/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_04.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_04_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_04_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
7,614 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_05_bad()
{
int data;
/* Initialize data */
data = -1;
if(staticTrue)
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
}
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110556/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_05.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_05_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_05_bad(void)
{
int iVar1;
int iVar2;
undefined4 *puVar3;
ulong uStack_28;
uint uStack_1c;
uStack_1c = 0xffffffff;
if (staticTrue != 0) {
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uStack_1c = func_0x00400ae0();
uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf;
}
puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2);
for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) {
puVar3[uStack_28] = 0;
}
printIntLine(*puVar3);
func_0x00400a20(puVar3);
return;
}
| ['gcc'] |
7,615 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_05_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110556/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_05.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_05_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_05_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
7,616 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_06_bad()
{
int data;
/* Initialize data */
data = -1;
if(STATIC_CONST_FIVE==5)
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
}
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110557/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_06.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_06_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_06_bad(void)
{
int iVar1;
int iVar2;
uint uVar3;
undefined4 *puVar4;
ulong uStack_28;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uVar3 = func_0x00400ae0();
uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf;
puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2);
for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uVar3; uStack_28 = uStack_28 + 1) {
puVar4[uStack_28] = 0;
}
printIntLine(*puVar4);
func_0x00400a20(puVar4);
return;
}
| ['gcc'] |
7,617 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_06_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110557/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_06.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_06_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_06_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
7,618 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_07_bad()
{
int data;
/* Initialize data */
data = -1;
if(staticFive==5)
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
}
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110558/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_07.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_07_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_07_bad(void)
{
int iVar1;
int iVar2;
undefined4 *puVar3;
ulong uStack_28;
uint uStack_1c;
uStack_1c = 0xffffffff;
if (staticFive == 5) {
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uStack_1c = func_0x00400ae0();
uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf;
}
puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2);
for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) {
puVar3[uStack_28] = 0;
}
printIntLine(*puVar3);
func_0x00400a20(puVar3);
return;
}
| ['gcc'] |
7,619 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_07_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110558/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_07.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_07_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_07_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
7,620 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_08_bad()
{
int data;
/* Initialize data */
data = -1;
if(staticReturnsTrue())
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
}
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110559/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_08.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_08_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_08_bad(void)
{
int iVar1;
int iVar2;
undefined4 *puVar3;
ulong uStack_28;
uint uStack_1c;
uStack_1c = 0xffffffff;
iVar1 = staticReturnsTrue();
if (iVar1 != 0) {
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uStack_1c = func_0x00400ae0();
uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf;
}
puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2);
for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) {
puVar3[uStack_28] = 0;
}
printIntLine(*puVar3);
func_0x00400a20(puVar3);
return;
}
| ['gcc'] |
7,621 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_08_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110559/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_08.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_08_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_08_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
7,622 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_09_bad()
{
int data;
/* Initialize data */
data = -1;
if(GLOBAL_CONST_TRUE)
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
}
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110560/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_09.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_09_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_09_bad(void)
{
int iVar1;
int iVar2;
undefined4 *puVar3;
ulong uStack_28;
uint uStack_1c;
uStack_1c = 0xffffffff;
if (GLOBAL_CONST_TRUE != 0) {
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uStack_1c = func_0x00400ae0();
uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf;
}
puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2);
for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) {
puVar3[uStack_28] = 0;
}
printIntLine(*puVar3);
func_0x00400a20(puVar3);
return;
}
| ['gcc'] |
7,623 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_09_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110560/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_09.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_09_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_09_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
7,624 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_10_bad()
{
int data;
/* Initialize data */
data = -1;
if(globalTrue)
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
}
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110561/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_10.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_10_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_10_bad(void)
{
int iVar1;
int iVar2;
undefined4 *puVar3;
ulong uStack_28;
uint uStack_1c;
uStack_1c = 0xffffffff;
if (globalTrue != 0) {
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uStack_1c = func_0x00400ae0();
uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf;
}
puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2);
for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) {
puVar3[uStack_28] = 0;
}
printIntLine(*puVar3);
func_0x00400a20(puVar3);
return;
}
| ['gcc'] |
7,625 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_10_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110561/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_10.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_10_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_10_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
7,626 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_11_bad()
{
int data;
/* Initialize data */
data = -1;
if(globalReturnsTrue())
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
}
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110562/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_11.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_11_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_11_bad(void)
{
int iVar1;
int iVar2;
undefined4 *puVar3;
ulong uStack_28;
uint uStack_1c;
uStack_1c = 0xffffffff;
iVar1 = globalReturnsTrue();
if (iVar1 != 0) {
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uStack_1c = func_0x00400ae0();
uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf;
}
puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2);
for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) {
puVar3[uStack_28] = 0;
}
printIntLine(*puVar3);
func_0x00400a20(puVar3);
return;
}
| ['gcc'] |
7,627 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_11_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110562/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_11.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_11_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_11_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
7,628 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_12_bad()
{
int data;
/* Initialize data */
data = -1;
if(globalReturnsTrueOrFalse())
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
}
else
{
/* FIX: Set data to a relatively small number greater than zero */
data = 20;
}
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* FIX: Set data to a relatively small number greater than zero */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110563/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_12.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_12_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_12_bad(void)
{
int iVar1;
int iVar2;
undefined4 *puVar3;
ulong uStack_28;
uint uStack_1c;
iVar1 = globalReturnsTrueOrFalse();
if (iVar1 == 0) {
uStack_1c = 0x14;
}
else {
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uStack_1c = func_0x00400ae0();
uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf;
}
puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2);
for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) {
puVar3[uStack_28] = 0;
}
printIntLine(*puVar3);
func_0x00400a20(puVar3);
return;
}
| ['gcc'] |
7,629 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_12_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110563/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_12.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_12_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_12_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,630 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_13_bad()
{
int data;
/* Initialize data */
data = -1;
if(GLOBAL_CONST_FIVE==5)
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
}
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110564/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_13.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_13_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_13_bad(void)
{
int iVar1;
int iVar2;
undefined4 *puVar3;
ulong uStack_28;
uint uStack_1c;
uStack_1c = 0xffffffff;
if (GLOBAL_CONST_FIVE == 5) {
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uStack_1c = func_0x00400ae0();
uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf;
}
puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2);
for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) {
puVar3[uStack_28] = 0;
}
printIntLine(*puVar3);
func_0x00400a20(puVar3);
return;
}
| ['gcc'] |
7,631 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_13_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110564/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_13.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_13_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_13_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
7,632 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_14_bad()
{
int data;
/* Initialize data */
data = -1;
if(globalFive==5)
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
}
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110565/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_14.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_14_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_14_bad(void)
{
int iVar1;
int iVar2;
undefined4 *puVar3;
ulong uStack_28;
uint uStack_1c;
uStack_1c = 0xffffffff;
if (globalFive == 5) {
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uStack_1c = func_0x00400ae0();
uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf;
}
puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_1c << 2);
for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_1c; uStack_28 = uStack_28 + 1) {
puVar3[uStack_28] = 0;
}
printIntLine(*puVar3);
func_0x00400a20(puVar3);
return;
}
| ['gcc'] |
7,633 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_14_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110565/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_14.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_14_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_14_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
7,634 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_15_bad()
{
int data;
/* Initialize data */
data = -1;
switch(6)
{
case 6:
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
break;
default:
/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */
printLine("Benign, fixed string");
break;
}
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110566/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_15.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_15_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_15_bad(void)
{
int iVar1;
int iVar2;
uint uVar3;
undefined4 *puVar4;
ulong uStack_20;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uVar3 = func_0x00400ae0();
uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf;
puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2);
for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uVar3; uStack_20 = uStack_20 + 1) {
puVar4[uStack_20] = 0;
}
printIntLine(*puVar4);
func_0x00400a20(puVar4);
return;
}
| ['gcc'] |
7,635 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_15_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110566/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_15.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_15_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_15_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
7,636 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_16_bad()
{
int data;
/* Initialize data */
data = -1;
while(1)
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
break;
}
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110567/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_16.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_16_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_16_bad(void)
{
int iVar1;
int iVar2;
uint uVar3;
undefined4 *puVar4;
ulong uStack_20;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uVar3 = func_0x00400ae0();
uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf;
puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2);
for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uVar3; uStack_20 = uStack_20 + 1) {
puVar4[uStack_20] = 0;
}
printIntLine(*puVar4);
func_0x00400a20(puVar4);
return;
}
| ['gcc'] |
7,637 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_16_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110567/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_16.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_16_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_16_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,638 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_17_bad()
{
int i;
int data;
/* Initialize data */
data = -1;
for(i = 0; i < 1; i++)
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
}
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110568/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_17.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_17_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_17_bad(void)
{
int iVar1;
int iVar2;
undefined4 *puVar3;
ulong uStack_28;
uint uStack_20;
int iStack_1c;
uStack_20 = 0xffffffff;
for (iStack_1c = 0; iStack_1c < 1; iStack_1c = iStack_1c + 1) {
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uStack_20 = func_0x00400ae0();
uStack_20 = uStack_20 ^ iVar1 << 0x1e ^ iVar2 << 0xf;
}
puVar3 = (undefined4 *)func_0x00400ab0((long)(int)uStack_20 << 2);
for (uStack_28 = 0; uStack_28 < (ulong)(long)(int)uStack_20; uStack_28 = uStack_28 + 1) {
puVar3[uStack_28] = 0;
}
printIntLine(*puVar3);
func_0x00400a20(puVar3);
return;
}
| ['gcc'] |
7,639 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_17_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110568/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_17.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_17_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_17_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,640 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_18_bad()
{
int data;
/* Initialize data */
data = -1;
goto source;
source:
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110569/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_18.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_18_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_18_bad(void)
{
int iVar1;
int iVar2;
uint uVar3;
undefined4 *puVar4;
ulong uStack_20;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uVar3 = func_0x00400ae0();
uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf;
puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2);
for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uVar3; uStack_20 = uStack_20 + 1) {
puVar4[uStack_20] = 0;
}
printIntLine(*puVar4);
func_0x00400a20(puVar4);
return;
}
| ['gcc'] |
7,641 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_18_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110569/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_18.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_18_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_18_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,642 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_21_bad()
{
int data;
/* Initialize data */
data = -1;
badStatic = 1; /* true */
data = badSource(data);
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* true */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110570/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_21.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_21_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_21_bad(void)
{
int iVar1;
undefined4 *puVar2;
ulong uStack_10;
badStatic = 1;
iVar1 = badSource(0xffffffff);
puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) {
puVar2[uStack_10] = 0;
}
printIntLine(*puVar2);
func_0x00400a20(puVar2);
return;
}
| ['gcc'] |
7,643 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_21_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110570/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_21.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_21_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_21_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
7,644 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_bad()
{
int data;
/* Initialize data */
data = -1;
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badGlobal = 1; /* true */
data = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badSource(data);
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* true */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110571/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_bad(void)
{
int iVar1;
undefined4 *puVar2;
ulong uStack_10;
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badGlobal = 1;
iVar1 = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badSource(0xffffffff);
puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) {
puVar2[uStack_10] = 0;
}
printIntLine(*puVar2);
func_0x00400a20(puVar2);
return;
}
| ['gcc'] |
7,645 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_good()
{
goodG2B1();
goodG2B2();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110571/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_good(void)
{
goodG2B1();
goodG2B2();
return;
}
| ['gcc'] |
7,646 | int CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badSource(int data)
{
if(CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badGlobal)
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
}
return data;
} | ['/* POTENTIAL FLAW: Set data to a random value */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110571/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badSource |
uint CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badSource(uint param_1)
{
int iVar1;
int iVar2;
uint uStack_1c;
uStack_1c = param_1;
if (CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_badGlobal != 0) {
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uStack_1c = func_0x00400ae0();
uStack_1c = uStack_1c ^ iVar1 << 0x1e ^ iVar2 << 0xf;
}
return uStack_1c;
}
| ['gcc'] |
7,647 | int CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B1Source(int data)
{
if(CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B1Global)
{
/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */
printLine("Benign, fixed string");
}
else
{
/* FIX: Set data to a relatively small number greater than zero */
data = 20;
}
return data;
} | ['/* INCIDENTAL: CWE 561 Dead Code, the code below will never run */', '/* FIX: Set data to a relatively small number greater than zero */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110571/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B1Source |
undefined4
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B1Source(undefined4 param_1)
{
undefined4 uStack_c;
if (CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B1Global == 0) {
uStack_c = 0x14;
}
else {
printLine(&UNK_004012c4);
uStack_c = param_1;
}
return uStack_c;
}
| ['gcc'] |
7,648 | int CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B2Source(int data)
{
if(CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B2Global)
{
/* FIX: Set data to a relatively small number greater than zero */
data = 20;
}
return data;
} | ['/* FIX: Set data to a relatively small number greater than zero */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110571/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B2Source |
undefined4
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B2Source(undefined4 param_1)
{
undefined4 uStack_c;
uStack_c = param_1;
if (CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_22_goodG2B2Global != 0) {
uStack_c = 0x14;
}
return uStack_c;
}
| ['gcc'] |
7,649 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_31_bad()
{
int data;
/* Initialize data */
data = -1;
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
{
int dataCopy = data;
int data = dataCopy;
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110572/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_31.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_31_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_31_bad(void)
{
int iVar1;
int iVar2;
uint uVar3;
undefined4 *puVar4;
ulong uStack_20;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uVar3 = func_0x00400ae0();
uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf;
puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2);
for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uVar3; uStack_20 = uStack_20 + 1) {
puVar4[uStack_20] = 0;
}
printIntLine(*puVar4);
func_0x00400a20(puVar4);
return;
}
| ['gcc'] |
7,650 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_31_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110572/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_31.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_31_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_31_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,651 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_32_bad()
{
int data;
int *dataPtr1 = &data;
int *dataPtr2 = &data;
/* Initialize data */
data = -1;
{
int data = *dataPtr1;
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
*dataPtr1 = data;
}
{
int data = *dataPtr2;
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110573/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_32.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_32_bad |
/* WARNING: Restarted to delay deadcode elimination for space: stack */
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_32_bad(void)
{
int iVar1;
int iVar2;
uint uStack_44;
undefined4 *puStack_40;
uint uStack_38;
uint uStack_34;
uint *puStack_30;
uint *puStack_28;
ulong uStack_20;
puStack_28 = &uStack_44;
puStack_30 = &uStack_44;
uStack_44 = 0xffffffff;
uStack_34 = 0xffffffff;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uStack_34 = func_0x00400ae0();
uStack_34 = uStack_34 ^ iVar1 << 0x1e ^ iVar2 << 0xf;
*puStack_28 = uStack_34;
uStack_38 = *puStack_30;
puStack_40 = (undefined4 *)func_0x00400ab0((long)(int)uStack_38 << 2);
for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uStack_38; uStack_20 = uStack_20 + 1) {
puStack_40[uStack_20] = 0;
}
printIntLine(*puStack_40);
func_0x00400a20(puStack_40);
return;
}
| ['gcc'] |
7,652 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_32_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110573/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_32.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_32_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_32_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,653 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34_bad()
{
int data;
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34_unionType myUnion;
/* Initialize data */
data = -1;
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
myUnion.unionFirst = data;
{
int data = myUnion.unionSecond;
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110575/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34_bad(void)
{
int iVar1;
int iVar2;
uint uVar3;
undefined4 *puVar4;
ulong uStack_20;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uVar3 = func_0x00400ae0();
uVar3 = uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf;
puVar4 = (undefined4 *)func_0x00400ab0((long)(int)uVar3 << 2);
for (uStack_20 = 0; uStack_20 < (ulong)(long)(int)uVar3; uStack_20 = uStack_20 + 1) {
puVar4[uStack_20] = 0;
}
printIntLine(*puVar4);
func_0x00400a20(puVar4);
return;
}
| ['gcc'] |
7,654 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110575/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_34_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,655 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_badSink(int data)
{
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110576/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_badSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_badSink(int param_1)
{
undefined4 *puVar1;
ulong uStack_10;
puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) {
puVar1[uStack_10] = 0;
}
printIntLine(*puVar1);
func_0x00400a20(puVar1);
return;
}
| ['gcc'] |
7,656 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_bad()
{
int data;
/* Initialize data */
data = -1;
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110576/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_bad(void)
{
int iVar1;
int iVar2;
uint uVar3;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uVar3 = func_0x00400ae0();
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_badSink
(uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf);
return;
}
| ['gcc'] |
7,657 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_goodG2BSink(int data)
{
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110576/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_goodG2BSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_goodG2BSink(int param_1)
{
undefined4 *puVar1;
ulong uStack_10;
puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) {
puVar1[uStack_10] = 0;
}
printIntLine(*puVar1);
func_0x00400a20(puVar1);
return;
}
| ['gcc'] |
7,658 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110576/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_41_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,659 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_42_bad()
{
int data;
/* Initialize data */
data = -1;
data = badSource(data);
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110577/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_42.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_42_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_42_bad(void)
{
int iVar1;
undefined4 *puVar2;
ulong uStack_10;
iVar1 = badSource(0xffffffff);
puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) {
puVar2[uStack_10] = 0;
}
printIntLine(*puVar2);
func_0x00400a20(puVar2);
return;
}
| ['gcc'] |
7,660 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_42_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110577/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_42.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_42_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_42_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,661 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51_bad()
{
int data;
/* Initialize data */
data = -1;
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110581/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51_bad(void)
{
int iVar1;
int iVar2;
uint uVar3;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uVar3 = func_0x00400ae0();
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b_badSink
(uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf);
return;
}
| ['gcc'] |
7,662 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110581/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,663 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b_badSink(int data)
{
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110581/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b_badSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b_badSink(int param_1)
{
undefined4 *puVar1;
ulong uStack_10;
puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) {
puVar1[uStack_10] = 0;
}
printIntLine(*puVar1);
func_0x00400a20(puVar1);
return;
}
| ['gcc'] |
7,664 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b_goodG2BSink(int data)
{
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110581/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b_goodG2BSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_51b_goodG2BSink(int param_1)
{
undefined4 *puVar1;
ulong uStack_10;
puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) {
puVar1[uStack_10] = 0;
}
printIntLine(*puVar1);
func_0x00400a20(puVar1);
return;
}
| ['gcc'] |
7,665 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52_bad()
{
int data;
/* Initialize data */
data = -1;
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110582/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52_bad(void)
{
int iVar1;
int iVar2;
uint uVar3;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uVar3 = func_0x00400ae0();
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b_badSink
(uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf);
return;
}
| ['gcc'] |
7,666 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110582/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,667 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b_badSink(int data)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_badSink(data);
} | [] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110582/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b_badSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b_badSink(undefined4 param_1)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_badSink(param_1);
return;
}
| ['gcc'] |
7,668 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b_goodG2BSink(int data)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110582/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b_goodG2BSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52b_goodG2BSink(undefined4 param_1)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_goodG2BSink(param_1);
return;
}
| ['gcc'] |
7,669 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_badSink(int data)
{
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110582/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_badSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_badSink(int param_1)
{
undefined4 *puVar1;
ulong uStack_10;
puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) {
puVar1[uStack_10] = 0;
}
printIntLine(*puVar1);
func_0x00400a20(puVar1);
return;
}
| ['gcc'] |
7,670 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_goodG2BSink(int data)
{
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110582/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_goodG2BSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_52c_goodG2BSink(int param_1)
{
undefined4 *puVar1;
ulong uStack_10;
puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) {
puVar1[uStack_10] = 0;
}
printIntLine(*puVar1);
func_0x00400a20(puVar1);
return;
}
| ['gcc'] |
7,671 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53_bad()
{
int data;
/* Initialize data */
data = -1;
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110583/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53_bad(void)
{
int iVar1;
int iVar2;
uint uVar3;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uVar3 = func_0x00400ae0();
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b_badSink
(uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf);
return;
}
| ['gcc'] |
7,672 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110583/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,673 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b_badSink(int data)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_badSink(data);
} | [] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110583/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b_badSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b_badSink(undefined4 param_1)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_badSink(param_1);
return;
}
| ['gcc'] |
7,674 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b_goodG2BSink(int data)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110583/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b_goodG2BSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53b_goodG2BSink(undefined4 param_1)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_goodG2BSink(param_1);
return;
}
| ['gcc'] |
7,675 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_badSink(int data)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_badSink(data);
} | [] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110583/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_badSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_badSink(undefined4 param_1)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_badSink(param_1);
return;
}
| ['gcc'] |
7,676 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_goodG2BSink(int data)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110583/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_goodG2BSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53c_goodG2BSink(undefined4 param_1)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_goodG2BSink(param_1);
return;
}
| ['gcc'] |
7,677 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_badSink(int data)
{
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110583/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_badSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_badSink(int param_1)
{
undefined4 *puVar1;
ulong uStack_10;
puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) {
puVar1[uStack_10] = 0;
}
printIntLine(*puVar1);
func_0x00400a20(puVar1);
return;
}
| ['gcc'] |
7,678 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_goodG2BSink(int data)
{
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110583/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_goodG2BSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_53d_goodG2BSink(int param_1)
{
undefined4 *puVar1;
ulong uStack_10;
puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) {
puVar1[uStack_10] = 0;
}
printIntLine(*puVar1);
func_0x00400a20(puVar1);
return;
}
| ['gcc'] |
7,679 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54_bad()
{
int data;
/* Initialize data */
data = -1;
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b_badSink(data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54_bad(void)
{
int iVar1;
int iVar2;
uint uVar3;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uVar3 = func_0x00400ae0();
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b_badSink
(uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf);
return;
}
| ['gcc'] |
7,680 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,681 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b_badSink(int data)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_badSink(data);
} | [] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b_badSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b_badSink(undefined4 param_1)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_badSink(param_1);
return;
}
| ['gcc'] |
7,682 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b_goodG2BSink(int data)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b_goodG2BSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54b_goodG2BSink(undefined4 param_1)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_goodG2BSink(param_1);
return;
}
| ['gcc'] |
7,683 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_badSink(int data)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_badSink(data);
} | [] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_badSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_badSink(undefined4 param_1)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_badSink(param_1);
return;
}
| ['gcc'] |
7,684 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_goodG2BSink(int data)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_goodG2BSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54c_goodG2BSink(undefined4 param_1)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_goodG2BSink(param_1);
return;
}
| ['gcc'] |
7,685 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_badSink(int data)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_badSink(data);
} | [] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_badSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_badSink(undefined4 param_1)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_badSink(param_1);
return;
}
| ['gcc'] |
7,686 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_goodG2BSink(int data)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_goodG2BSink(data);
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_goodG2BSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54d_goodG2BSink(undefined4 param_1)
{
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_goodG2BSink(param_1);
return;
}
| ['gcc'] |
7,687 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_badSink(int data)
{
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_badSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_badSink(int param_1)
{
undefined4 *puVar1;
ulong uStack_10;
puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) {
puVar1[uStack_10] = 0;
}
printIntLine(*puVar1);
func_0x00400a20(puVar1);
return;
}
| ['gcc'] |
7,688 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_goodG2BSink(int data)
{
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110584/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_goodG2BSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_54e_goodG2BSink(int param_1)
{
undefined4 *puVar1;
ulong uStack_10;
puVar1 = (undefined4 *)func_0x00400ab0((long)param_1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)param_1; uStack_10 = uStack_10 + 1) {
puVar1[uStack_10] = 0;
}
printIntLine(*puVar1);
func_0x00400a20(puVar1);
return;
}
| ['gcc'] |
7,689 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61_bad()
{
int data;
/* Initialize data */
data = -1;
data = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b_badSource(data);
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* Initialize data */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110585/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61_bad(void)
{
int iVar1;
undefined4 *puVar2;
ulong uStack_10;
iVar1 = CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b_badSource(0xffffffff);
puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) {
puVar2[uStack_10] = 0;
}
printIntLine(*puVar2);
func_0x00400a20(puVar2);
return;
}
| ['gcc'] |
7,690 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110585/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,691 | int CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b_badSource(int data)
{
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
return data;
} | ['/* POTENTIAL FLAW: Set data to a random value */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110585/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b_badSource |
uint CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b_badSource(void)
{
int iVar1;
int iVar2;
uint uVar3;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
uVar3 = func_0x00400ae0();
return uVar3 ^ iVar1 << 0x1e ^ iVar2 << 0xf;
}
| ['gcc'] |
7,692 | int CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b_goodG2BSource(int data)
{
/* FIX: Set data to a relatively small number greater than zero */
data = 20;
return data;
} | ['/* FIX: Set data to a relatively small number greater than zero */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110585/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b_goodG2BSource |
undefined4 CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_61b_goodG2BSource(void)
{
return 0x14;
}
| ['gcc'] |
7,693 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63_bad()
{
int data;
/* Initialize data */
data = -1;
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b_badSink(&data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110587/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63_bad(void)
{
int iVar1;
int iVar2;
uint auStack_1c [3];
auStack_1c[0] = 0xffffffff;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
auStack_1c[0] = func_0x00400ae0();
auStack_1c[0] = auStack_1c[0] ^ iVar1 << 0x1e ^ iVar2 << 0xf;
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b_badSink(auStack_1c);
return;
}
| ['gcc'] |
7,694 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110587/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,695 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b_badSink(int * dataPtr)
{
int data = *dataPtr;
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110587/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b_badSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b_badSink(int *param_1)
{
int iVar1;
undefined4 *puVar2;
ulong uStack_10;
iVar1 = *param_1;
puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) {
puVar2[uStack_10] = 0;
}
printIntLine(*puVar2);
func_0x00400a20(puVar2);
return;
}
| ['gcc'] |
7,696 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b_goodG2BSink(int * dataPtr)
{
int data = *dataPtr;
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110587/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b_goodG2BSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_63b_goodG2BSink(int *param_1)
{
int iVar1;
undefined4 *puVar2;
ulong uStack_10;
iVar1 = *param_1;
puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) {
puVar2[uStack_10] = 0;
}
printIntLine(*puVar2);
func_0x00400a20(puVar2);
return;
}
| ['gcc'] |
7,697 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64_bad()
{
int data;
/* Initialize data */
data = -1;
/* POTENTIAL FLAW: Set data to a random value */
data = RAND32();
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64b_badSink(&data);
} | ['/* Initialize data */', '/* POTENTIAL FLAW: Set data to a random value */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110588/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64_bad |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64_bad(void)
{
int iVar1;
int iVar2;
uint auStack_1c [3];
auStack_1c[0] = 0xffffffff;
iVar1 = func_0x00400ae0();
iVar2 = func_0x00400ae0();
auStack_1c[0] = func_0x00400ae0();
auStack_1c[0] = auStack_1c[0] ^ iVar1 << 0x1e ^ iVar2 << 0xf;
CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64b_badSink(auStack_1c);
return;
}
| ['gcc'] |
7,698 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64_good()
{
goodG2B();
} | [] | null | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110588/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64a.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64_good |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64_good(void)
{
goodG2B();
return;
}
| ['gcc'] |
7,699 | void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64b_badSink(void * dataVoidPtr)
{
/* cast void pointer to a pointer of the appropriate type */
int * dataPtr = (int *)dataVoidPtr;
/* dereference dataPtr into data */
int data = (*dataPtr);
{
size_t i;
int *intPointer;
/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value
* so that the for loop doing the initialization causes a buffer overflow */
intPointer = (int*)malloc(data * sizeof(int));
for (i = 0; i < (size_t)data; i++)
{
intPointer[i] = 0; /* Potentially writes beyond the boundary of intPointer */
}
printIntLine(intPointer[0]);
free(intPointer);
}
} | ['/* cast void pointer to a pointer of the appropriate type */', '/* dereference dataPtr into data */', '/* POTENTIAL FLAW: if data * sizeof(int) > SIZE_MAX, overflows to a small value\r\n * so that the for loop doing the initialization causes a buffer overflow */', '/* Potentially writes beyond the boundary of intPointer */'] | ['CWE680'] | mvd | /work/xgk011/.cache/huggingface/datasets/downloads/extracted/486fbd3d4a8ebc225e93d9cfb666bef6ac127e67788d52f03aa0e741860aa84a/muVulDeePecker-master/source files/upload_source_1/110588/CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64b.c | CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64b_badSink |
void CWE680_Integer_Overflow_to_Buffer_Overflow__malloc_rand_64b_badSink(int *param_1)
{
int iVar1;
undefined4 *puVar2;
ulong uStack_10;
iVar1 = *param_1;
puVar2 = (undefined4 *)func_0x00400ab0((long)iVar1 << 2);
for (uStack_10 = 0; uStack_10 < (ulong)(long)iVar1; uStack_10 = uStack_10 + 1) {
puVar2[uStack_10] = 0;
}
printIntLine(*puVar2);
func_0x00400a20(puVar2);
return;
}
| ['gcc'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.