prompt
stringclasses
547 values
completions
listlengths
1
63.8k
labels
listlengths
1
63.8k
source
stringclasses
5 values
index
int64
0
151k
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/nls/nls_base.c\n *\n * Native language support--charsets and unicode translations.\n * By Gordon Chaffee 1996, 1997\n *\n * Unicode based case conversion 1999 by Wolfram Pienkoss\n *\n */", "#include <linux/module.h>\n#include <linux/string.h>\n#include <linux/nls.h>\n#include <linux/kernel.h>\n#...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
114
Determine whether the code is vulnerable or not.
[ "#ifndef _LINUX_NLS_H\n#define _LINUX_NLS_H", "#include <linux/init.h>", "/* Unicode has changed over the years. Unicode code points no longer\n * fit into 16 bits; as of Unicode 5 valid code points range from 0\n * to 0x10ffff (17 planes, where each plane holds 65536 code points).\n *\n * The original decisio...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
114
Determine whether the code is vulnerable or not.
[ "/*\n * Edgeport USB Serial Converter driver\n *\n * Copyright (C) 2000-2002 Inside Out Networks, All rights reserved.\n * Copyright (C) 2001-2002 Greg Kroah-Hartman <greg@kroah.com>\n *\n *\tThis program is free software; you can redistribute it and/or modify\n *\tit under the terms of the GNU General Public Licen...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
115
Determine whether the code is vulnerable or not.
[ "#ifndef _ASM_X86_PGTABLE_H\n#define _ASM_X86_PGTABLE_H", "#include <asm/page.h>\n#include <asm/e820.h>", "#include <asm/pgtable_types.h>", "/*\n * Macro to mark a page protection value as UC-\n */\n#define pgprot_noncached(prot)\t\t\t\t\t\\\n\t((boot_cpu_data.x86 > 3)\t\t\t\t\\\n\t ? (__pgprot(pgprot_val(pro...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
116
Determine whether the code is vulnerable or not.
[ "/*\n * CIPSO - Commercial IP Security Option\n *\n * This is an implementation of the CIPSO 2.2 protocol as specified in\n * draft-ietf-cipso-ipsecurity-01.txt with additional tag types as found in\n * FIPS-188. While CIPSO never became a full IETF RFC standard many vendors\n * have chosen to adopt the protocol a...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
117
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2005-2010 IBM Corporation\n *\n * Authors:\n * Mimi Zohar <zohar@us.ibm.com>\n * Kylene Hall <kjhall@us.ibm.com>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundatio...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
118
Determine whether the code is vulnerable or not.
[ "/*\n *\tSUCS NET3:\n *\n *\tGeneric datagram handling routines. These are generic for all\n *\tprotocols. Possibly a generic IP version on top of these would\n *\tmake sense. Not tonight however 8-).\n *\tThis is used because UDP, RAW, PACKET, DDP, IPX, AX.25 and\n *\tNetROM layer all have identical poll code and ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
119
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2007 Oracle. All rights reserved.\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public\n * License v2 as published by the Free Software Foundation.\n *\n * This program is distributed in the hope that it will be useful,\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
120
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2007 Oracle. All rights reserved.\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public\n * License v2 as published by the Free Software Foundation.\n *\n * This program is distributed in the hope that it will be useful,\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
120
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2007 Oracle. All rights reserved.\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public\n * License v2 as published by the Free Software Foundation.\n *\n * This program is distributed in the hope that it will be useful,\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
120
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2007 Oracle. All rights reserved.\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public\n * License v2 as published by the Free Software Foundation.\n *\n * This program is distributed in the hope that it will be useful,\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
120
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2007 Oracle. All rights reserved.\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public\n * License v2 as published by the Free Software Foundation.\n *\n * This program is distributed in the hope that it will be useful,\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
120
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2007 Oracle. All rights reserved.\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public\n * License v2 as published by the Free Software Foundation.\n *\n * This program is distributed in the hope that it will be useful,\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
121
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2007 Oracle. All rights reserved.\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public\n * License v2 as published by the Free Software Foundation.\n *\n * This program is distributed in the hope that it will be useful,\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
121
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2007 Oracle. All rights reserved.\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public\n * License v2 as published by the Free Software Foundation.\n *\n * This program is distributed in the hope that it will be useful,\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
121
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2007 Oracle. All rights reserved.\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public\n * License v2 as published by the Free Software Foundation.\n *\n * This program is distributed in the hope that it will be useful,\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
121
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2007 Oracle. All rights reserved.\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public\n * License v2 as published by the Free Software Foundation.\n *\n * This program is distributed in the hope that it will be useful,\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
121
Determine whether the code is vulnerable or not.
[ "/*\n * x86 single-step support code, common to 32-bit and 64-bit.\n */\n#include <linux/sched.h>\n#include <linux/mm.h>\n#include <linux/ptrace.h>\n#include <asm/desc.h>", "unsigned long convert_ip_to_linear(struct task_struct *child, struct pt_regs *regs)\n{\n\tunsigned long addr, seg;", "\taddr = regs->ip;\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
122
Determine whether the code is vulnerable or not.
[ "/*\n * linux/kernel/ptrace.c\n *\n * (C) Copyright 1999 Linus Torvalds\n *\n * Common interfaces for \"ptrace()\" which we do not want\n * to continually duplicate across every architecture.\n */", "#include <linux/capability.h>\n#include <linux/export.h>\n#include <linux/sched.h>\n#include <linux/errno.h>\n#inc...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
122
Determine whether the code is vulnerable or not.
[ "/*\n * linux/kernel/signal.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n *\n * 1997-11-02 Modified for POSIX.1b signals by Richard Henderson\n *\n * 2003-06-02 Jim Houston - Concurrent Computer Corp.\n *\t\tChanges to use preallocated sigqueue structures\n *\t\tto allow signals to be sent reliably.\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
122
Determine whether the code is vulnerable or not.
[ "/*\n * binfmt_misc.c\n *\n * Copyright (C) 1997 Richard Günther\n *\n * binfmt_misc detects binaries via a magic or filename extension and invokes\n * a specified wrapper. This should obsolete binfmt_java, binfmt_em86 and\n * binfmt_mz.\n *\n * 1997-04-25 first version\n * [...]\n * 1997-05-19 cleanup\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
123
Determine whether the code is vulnerable or not.
[ "/*\n * binfmt_misc.c\n *\n * Copyright (C) 1997 Richard Günther\n *\n * binfmt_misc detects binaries via a magic or filename extension and invokes\n * a specified wrapper. This should obsolete binfmt_java, binfmt_em86 and\n * binfmt_mz.\n *\n * 1997-04-25 first version\n * [...]\n * 1997-05-19 cleanup\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
123
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/binfmt_script.c\n *\n * Copyright (C) 1996 Martin von Löwis\n * original #!-checking implemented by tytso.\n */", "#include <linux/module.h>\n#include <linux/string.h>\n#include <linux/stat.h>\n#include <linux/binfmts.h>\n#include <linux/init.h>\n#include <linux/file.h>\n#include <linux/err.h...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
123
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/binfmt_script.c\n *\n * Copyright (C) 1996 Martin von Löwis\n * original #!-checking implemented by tytso.\n */", "#include <linux/module.h>\n#include <linux/string.h>\n#include <linux/stat.h>\n#include <linux/binfmts.h>\n#include <linux/init.h>\n#include <linux/file.h>\n#include <linux/err.h...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
123
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/exec.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n */", "/*\n * #!-checking implemented by tytso.\n */\n/*\n * Demand-loading implemented 01.12.91 - no need to read anything but\n * the header into memory. The inode of the executable is put into\n * \"current->executable\", and page faul...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
123
Determine whether the code is vulnerable or not.
[ "#ifndef _LINUX_BINFMTS_H\n#define _LINUX_BINFMTS_H", "#include <linux/sched.h>\n#include <linux/unistd.h>\n#include <asm/exec.h>\n#include <uapi/linux/binfmts.h>", "#define CORENAME_MAX_SIZE 128", "/*\n * This structure is used to hold the arguments that are used when loading binaries.\n */\nstruct linux_bin...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
123
Determine whether the code is vulnerable or not.
[ "/*\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License version 2\n * as published by the Free Software Foundation; or, when distributed\n * separately from the Linux kernel or incorporated into other\n * software packages, subject to the...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
124
Determine whether the code is vulnerable or not.
[ "/*\n * Network-device interface management.\n *\n * Copyright (c) 2004-2005, Keir Fraser\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License version 2\n * as published by the Free Software Foundation; or, when distributed\n * separat...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
124
Determine whether the code is vulnerable or not.
[ "/*\n * Back-end of the driver for virtual network devices. This portion of the\n * driver exports a 'unified' network-device interface that can be accessed\n * by any operating system that implements a compatible front end. A\n * reference front-end implementation can be found in:\n * drivers/net/xen-netfront.c\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
124
Determine whether the code is vulnerable or not.
[ "/*\n * Back-end of the driver for virtual network devices. This portion of the\n * driver exports a 'unified' network-device interface that can be accessed\n * by any operating system that implements a compatible front end. A\n * reference front-end implementation can be found in:\n * drivers/net/xen-netfront.c\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
124
Determine whether the code is vulnerable or not.
[ "/*\n * Back-end of the driver for virtual network devices. This portion of the\n * driver exports a 'unified' network-device interface that can be accessed\n * by any operating system that implements a compatible front end. A\n * reference front-end implementation can be found in:\n * drivers/net/xen-netfront.c\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
125
Determine whether the code is vulnerable or not.
[ "/* ----------------------------------------------------------------------- *\n *\n * Copyright 2000-2008 H. Peter Anvin - All Rights Reserved\n * Copyright 2009 Intel Corporation; author: H. Peter Anvin\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of t...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
126
Determine whether the code is vulnerable or not.
[ "/*\n * cdc-wdm.c\n *\n * This driver supports USB CDC WCM Device Management.\n *\n * Copyright (c) 2007-2009 Oliver Neukum\n *\n * Some code taken from cdc-acm.c\n *\n * Released under the GPLv2.\n *\n * Many thanks to Carl Nordbeck\n */\n#include <linux/kernel.h>\n#include <linux/errno.h>\n#include <linux/slab.h>...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
127
Determine whether the code is vulnerable or not.
[ "/* SCTP kernel implementation\n * (C) Copyright IBM Corp. 2001, 2004\n * Copyright (c) 1999-2000 Cisco, Inc.\n * Copyright (c) 1999-2001 Motorola, Inc.\n * Copyright (c) 2001-2003 Intel Corp.\n * Copyright (c) 2001-2002 Nokia, Inc.\n * Copyright (c) 2001 La Monte H.P. Yarroll\n *\n * This file is part of the SCTP ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
128
Determine whether the code is vulnerable or not.
[ "/*\n * Kernel-based Virtual Machine driver for Linux\n *\n * This header defines architecture specific interfaces, x86 version\n *\n * This work is licensed under the terms of the GNU GPL, version 2. See\n * the COPYING file in the top-level directory.\n *\n */", "#ifndef _ASM_X86_KVM_HOST_H\n#define _ASM_X86_K...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
129
Determine whether the code is vulnerable or not.
[ "/*\n * Kernel-based Virtual Machine driver for Linux\n *\n * derived from drivers/kvm/kvm_main.c\n *\n * Copyright (C) 2006 Qumranet, Inc.\n * Copyright (C) 2008 Qumranet, Inc.\n * Copyright IBM Corporation, 2008\n * Copyright 2010 Red Hat, Inc. and/or its affiliates.\n *\n * Authors:\n * Avi Kivity <avi@qumra...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
129
Determine whether the code is vulnerable or not.
[ "/*\n * Kernel-based Virtual Machine driver for Linux\n *\n * derived from drivers/kvm/kvm_main.c\n *\n * Copyright (C) 2006 Qumranet, Inc.\n * Copyright (C) 2008 Qumranet, Inc.\n * Copyright IBM Corporation, 2008\n * Copyright 2010 Red Hat, Inc. and/or its affiliates.\n *\n * Authors:\n * Avi Kivity <avi@qumra...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
129
Determine whether the code is vulnerable or not.
[ "/*\n * Kernel-based Virtual Machine driver for Linux\n *\n * derived from drivers/kvm/kvm_main.c\n *\n * Copyright (C) 2006 Qumranet, Inc.\n * Copyright (C) 2008 Qumranet, Inc.\n * Copyright IBM Corporation, 2008\n * Copyright 2010 Red Hat, Inc. and/or its affiliates.\n *\n * Authors:\n * Avi Kivity <avi@qumra...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
130
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (C) 2001 MandrakeSoft S.A.\n * Copyright 2010 Red Hat, Inc. and/or its affiliates.\n *\n * MandrakeSoft S.A.\n * 43, rue d'Aboukir\n * 75002 Paris - France\n * http://www.linux-mandrake.com/\n * http://www.mandrakesoft.com/\n *\n * This library is free software; you can redistri...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
131
Determine whether the code is vulnerable or not.
[ "/*\n * linux/kernel/signal.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n *\n * 1997-11-02 Modified for POSIX.1b signals by Richard Henderson\n *\n * 2003-06-02 Jim Houston - Concurrent Computer Corp.\n *\t\tChanges to use preallocated sigqueue structures\n *\t\tto allow signals to be sent reliably.\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
132
Determine whether the code is vulnerable or not.
[ "/* Manage a process's keyrings\n *\n * Copyright (C) 2004-2005, 2008 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by the Fr...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
133
Determine whether the code is vulnerable or not.
[ "/*\n * linux/fs/ext3/super.c\n *\n * Copyright (C) 1992, 1993, 1994, 1995\n * Remy Card (card@masi.ibp.fr)\n * Laboratoire MASI - Institut Blaise Pascal\n * Universite Pierre et Marie Curie (Paris VI)\n *\n * from\n *\n * linux/fs/minix/inode.c\n *\n * Copyright (C) 1991, 1992 Linus Torvalds\n *\n * Big-endi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
134
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (c) 2008-2011, Intel Corporation.\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public License,\n * version 2, as published by the Free Software Foundation.\n *\n * This program is distributed in the hope it wi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
135
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tRouting netlink socket interface: protocol independent part.\n *\n * Authors:\tAlexey Kuznet...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
136
Determine whether the code is vulnerable or not.
[ "/* xfrm_user.c: User interface to configure xfrm engine.\n *\n * Copyright (C) 2002 David S. Miller (davem@redhat.com)\n *\n * Changes:\n *\tMitsuru KANDA @USAGI\n * \tKazunori MIYAZAWA @USAGI\n * \tKunihiro Ishiguro <kunihiro@ipinfusion.com>\n * \t\tIPv6 support\n *\n */", "#include <linux/crypto.h>\n#include <...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
137
Determine whether the code is vulnerable or not.
[ "/* xfrm_user.c: User interface to configure xfrm engine.\n *\n * Copyright (C) 2002 David S. Miller (davem@redhat.com)\n *\n * Changes:\n *\tMitsuru KANDA @USAGI\n * \tKazunori MIYAZAWA @USAGI\n * \tKunihiro Ishiguro <kunihiro@ipinfusion.com>\n * \t\tIPv6 support\n *\n */", "#include <linux/crypto.h>\n#include <...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
138
Determine whether the code is vulnerable or not.
[ "/* xfrm_user.c: User interface to configure xfrm engine.\n *\n * Copyright (C) 2002 David S. Miller (davem@redhat.com)\n *\n * Changes:\n *\tMitsuru KANDA @USAGI\n * \tKazunori MIYAZAWA @USAGI\n * \tKunihiro Ishiguro <kunihiro@ipinfusion.com>\n * \t\tIPv6 support\n *\n */", "#include <linux/crypto.h>\n#include <...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
139
Determine whether the code is vulnerable or not.
[ "/* xfrm_user.c: User interface to configure xfrm engine.\n *\n * Copyright (C) 2002 David S. Miller (davem@redhat.com)\n *\n * Changes:\n *\tMitsuru KANDA @USAGI\n * \tKazunori MIYAZAWA @USAGI\n * \tKunihiro Ishiguro <kunihiro@ipinfusion.com>\n * \t\tIPv6 support\n *\n */", "#include <linux/crypto.h>\n#include <...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
140
Determine whether the code is vulnerable or not.
[ "/* xfrm_user.c: User interface to configure xfrm engine.\n *\n * Copyright (C) 2002 David S. Miller (davem@redhat.com)\n *\n * Changes:\n *\tMitsuru KANDA @USAGI\n * \tKazunori MIYAZAWA @USAGI\n * \tKunihiro Ishiguro <kunihiro@ipinfusion.com>\n * \t\tIPv6 support\n *\n */", "#include <linux/crypto.h>\n#include <...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
140
Determine whether the code is vulnerable or not.
[ "/*\n * NET\t\tAn implementation of the SOCKET network access protocol.\n *\n * Version:\t@(#)socket.c\t1.1.93\t18/02/95\n *\n * Authors:\tOrest Zborowski, <obz@Kodak.COM>\n *\t\tRoss Biro\n *\t\tFred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>\n *\n * Fixes:\n *\t\tAnonymous\t:\tNOTSOCK/BADF cleanup. Error fix in\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
141
Determine whether the code is vulnerable or not.
[ "/*\n * IPVS An implementation of the IP virtual server support for the\n * LINUX operating system. IPVS is now implemented as a module\n * over the NetFilter framework. IPVS can be used to build a\n * high-performance and highly available server based on a\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
142
Determine whether the code is vulnerable or not.
[ "/*\n * af_llc.c - LLC User Interface SAPs\n * Description:\n * Functions in this module are implementation of socket based llc\n * communications for the Linux operating system. Support of llc class\n * one and class two is provided via SOCK_DGRAM and SOCK_STREAM\n * respectively.\n *\n * An llc2 connect...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
143
Determine whether the code is vulnerable or not.
[ "/*\n * af_llc.c - LLC User Interface SAPs\n * Description:\n * Functions in this module are implementation of socket based llc\n * communications for the Linux operating system. Support of llc class\n * one and class two is provided via SOCK_DGRAM and SOCK_STREAM\n * respectively.\n *\n * An llc2 connect...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
143
Determine whether the code is vulnerable or not.
[ "/*\n BlueZ - Bluetooth protocol stack for Linux\n Copyright (C) 2000-2001 Qualcomm Incorporated", " Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>", " This program is free software; you can redistribute it and/or modify\n it under the terms of the GNU General Public License version 2 as\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
144
Determine whether the code is vulnerable or not.
[ "/*\n BlueZ - Bluetooth protocol stack for Linux\n Copyright (C) 2000-2001 Qualcomm Incorporated\n Copyright (C) 2009-2010 Gustavo F. Padovan <gustavo@padovan.org>\n Copyright (C) 2010 Google Inc.\n Copyright (C) 2011 ProFUSION Embedded Systems", " Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
145
Determine whether the code is vulnerable or not.
[ "/*\n BlueZ - Bluetooth protocol stack for Linux\n Copyright (C) 2000-2001 Qualcomm Incorporated", " Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>", " This program is free software; you can redistribute it and/or modify\n it under the terms of the GNU General Public License version 2 as\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
146
Determine whether the code is vulnerable or not.
[ "/*\n RFCOMM implementation for Linux Bluetooth stack (BlueZ).\n Copyright (C) 2002 Maxim Krasnyansky <maxk@qualcomm.com>\n Copyright (C) 2002 Marcel Holtmann <marcel@holtmann.org>", " This program is free software; you can redistribute it and/or modify\n it under the terms of the GNU General Public Lic...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
147
Determine whether the code is vulnerable or not.
[ "/*\n RFCOMM implementation for Linux Bluetooth stack (BlueZ).\n Copyright (C) 2002 Maxim Krasnyansky <maxk@qualcomm.com>\n Copyright (C) 2002 Marcel Holtmann <marcel@holtmann.org>", " This program is free software; you can redistribute it and/or modify\n it under the terms of the GNU General Public Lic...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
148
Determine whether the code is vulnerable or not.
[ "/*\n RFCOMM implementation for Linux Bluetooth stack (BlueZ).\n Copyright (C) 2002 Maxim Krasnyansky <maxk@qualcomm.com>\n Copyright (C) 2002 Marcel Holtmann <marcel@holtmann.org>", " This program is free software; you can redistribute it and/or modify\n it under the terms of the GNU General Public Lic...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
149
Determine whether the code is vulnerable or not.
[ "/* net/atm/pvc.c - ATM PVC sockets */", "/* Written 1995-2000 by Werner Almesberger, EPFL LRC/ICA */", "\n#include <linux/net.h>\t\t/* struct socket, struct proto_ops */\n#include <linux/atm.h>\t\t/* ATM stuff */\n#include <linux/atmdev.h>\t/* ATM devices */\n#include <linux/errno.h>\t/* error codes */\n#inclu...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
150
Determine whether the code is vulnerable or not.
[ "/* net/atm/common.c - ATM sockets (common part for PVC and SVC) */", "/* Written 1995-2000 by Werner Almesberger, EPFL LRC/ICA */", "#define pr_fmt(fmt) KBUILD_MODNAME \":%s: \" fmt, __func__", "#include <linux/module.h>\n#include <linux/kmod.h>\n#include <linux/net.h>\t\t/* struct socket, struct proto_ops *...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
151
Determine whether the code is vulnerable or not.
[ "/*\n * TUN - Universal TUN/TAP device driver.\n * Copyright (C) 1999-2002 Maxim Krasnyansky <maxk@qualcomm.com>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
152
Determine whether the code is vulnerable or not.
[ "/*\n * namei.c\n *\n * PURPOSE\n * Inode name handling routines for the OSTA-UDF(tm) filesystem.\n *\n * COPYRIGHT\n * This file is distributed under the terms of the GNU General Public\n * License (GPL). Copies of the GPL can be obtained from:\n * ftp://prep.ai.mit.edu/pub/gnu/GPL\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
153
Determine whether the code is vulnerable or not.
[ "/*\n * fs/isofs/export.c\n *\n * (C) 2004 Paul Serice - The new inode scheme requires switching\n * from iget() to iget5_locked() which means\n * the NFS export operations have to be hand\n * coded because the default routines rely on\n *...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
154
Determine whether the code is vulnerable or not.
[ "/*\n * Asynchronous block chaining cipher operations.\n *\n * This is the asynchronous version of blkcipher.c indicating completion\n * via a callback.\n *\n * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the t...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
155
Determine whether the code is vulnerable or not.
[ "/*\n * AEAD: Authenticated Encryption with Associated Data\n *\n * This file provides API support for AEAD algorithms.\n *\n * Copyright (c) 2007 Herbert Xu <herbert@gondor.apana.org.au>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public Li...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
155
Determine whether the code is vulnerable or not.
[ "/*\n * Asynchronous Cryptographic Hash operations.\n *\n * This is the asynchronous version of hash.c with notification of\n * completion via a callback.\n *\n * Copyright (c) 2008 Loc Ho <lho@amcc.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU G...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
155
Determine whether the code is vulnerable or not.
[ "/*\n * Block chaining cipher operations.\n * \n * Generic encrypt/decrypt wrapper for ciphers, handles operations across\n * multiple page boundaries by using temporary blocks. In user context,\n * the kernel is given a chance to schedule us once per page.\n *\n * Copyright (c) 2006 Herbert Xu <herbert@gondor.apa...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
155
Determine whether the code is vulnerable or not.
[ "/*\n * Crypto user configuration API.\n *\n * Copyright (C) 2011 secunet Security Networks AG\n * Copyright (C) 2011 Steffen Klassert <steffen.klassert@secunet.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public License,\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 1, 1, 0, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
155
Determine whether the code is vulnerable or not.
[ "/*\n * Crypto user configuration API.\n *\n * Copyright (C) 2011 secunet Security Networks AG\n * Copyright (C) 2011 Steffen Klassert <steffen.klassert@secunet.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public License,\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
155
Determine whether the code is vulnerable or not.
[ "/*\n * Cryptographic API.\n *\n * Partial (de)compression operations.\n *\n * Copyright 2008 Sony Corporation\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; version 2 of the Lice...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
155
Determine whether the code is vulnerable or not.
[ "/*\n * Cryptographic API.\n *\n * RNG operations.\n *\n * Copyright (c) 2008 Neil Horman <nhorman@tuxdriver.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 o...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
155
Determine whether the code is vulnerable or not.
[ "/*\n * Synchronous Cryptographic Hash operations.\n *\n * Copyright (c) 2008 Herbert Xu <herbert@gondor.apana.org.au>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either versio...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
155
Determine whether the code is vulnerable or not.
[ "/*\n * Asynchronous block chaining cipher operations.\n *\n * This is the asynchronous version of blkcipher.c indicating completion\n * via a callback.\n *\n * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the t...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
156
Determine whether the code is vulnerable or not.
[ "/*\n * AEAD: Authenticated Encryption with Associated Data\n *\n * This file provides API support for AEAD algorithms.\n *\n * Copyright (c) 2007 Herbert Xu <herbert@gondor.apana.org.au>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public Li...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
156
Determine whether the code is vulnerable or not.
[ "/*\n * Asynchronous Cryptographic Hash operations.\n *\n * This is the asynchronous version of hash.c with notification of\n * completion via a callback.\n *\n * Copyright (c) 2008 Loc Ho <lho@amcc.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU G...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
156
Determine whether the code is vulnerable or not.
[ "/*\n * Block chaining cipher operations.\n * \n * Generic encrypt/decrypt wrapper for ciphers, handles operations across\n * multiple page boundaries by using temporary blocks. In user context,\n * the kernel is given a chance to schedule us once per page.\n *\n * Copyright (c) 2006 Herbert Xu <herbert@gondor.apa...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
156
Determine whether the code is vulnerable or not.
[ "/*\n * Crypto user configuration API.\n *\n * Copyright (C) 2011 secunet Security Networks AG\n * Copyright (C) 2011 Steffen Klassert <steffen.klassert@secunet.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public License,\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 1, 1, 0, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
156
Determine whether the code is vulnerable or not.
[ "/*\n * Crypto user configuration API.\n *\n * Copyright (C) 2011 secunet Security Networks AG\n * Copyright (C) 2011 Steffen Klassert <steffen.klassert@secunet.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public License,\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
156
Determine whether the code is vulnerable or not.
[ "/*\n * Cryptographic API.\n *\n * Partial (de)compression operations.\n *\n * Copyright 2008 Sony Corporation\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; version 2 of the Lice...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
156
Determine whether the code is vulnerable or not.
[ "/*\n * Cryptographic API.\n *\n * RNG operations.\n *\n * Copyright (c) 2008 Neil Horman <nhorman@tuxdriver.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 o...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
156
Determine whether the code is vulnerable or not.
[ "/*\n * Synchronous Cryptographic Hash operations.\n *\n * Copyright (c) 2008 Herbert Xu <herbert@gondor.apana.org.au>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either versio...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
156
Determine whether the code is vulnerable or not.
[ "/*\n * Asynchronous block chaining cipher operations.\n *\n * This is the asynchronous version of blkcipher.c indicating completion\n * via a callback.\n *\n * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the t...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
157
Determine whether the code is vulnerable or not.
[ "/*\n * AEAD: Authenticated Encryption with Associated Data\n *\n * This file provides API support for AEAD algorithms.\n *\n * Copyright (c) 2007 Herbert Xu <herbert@gondor.apana.org.au>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public Li...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
157
Determine whether the code is vulnerable or not.
[ "/*\n * Asynchronous Cryptographic Hash operations.\n *\n * This is the asynchronous version of hash.c with notification of\n * completion via a callback.\n *\n * Copyright (c) 2008 Loc Ho <lho@amcc.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU G...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
157
Determine whether the code is vulnerable or not.
[ "/*\n * Block chaining cipher operations.\n * \n * Generic encrypt/decrypt wrapper for ciphers, handles operations across\n * multiple page boundaries by using temporary blocks. In user context,\n * the kernel is given a chance to schedule us once per page.\n *\n * Copyright (c) 2006 Herbert Xu <herbert@gondor.apa...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
157
Determine whether the code is vulnerable or not.
[ "/*\n * Crypto user configuration API.\n *\n * Copyright (C) 2011 secunet Security Networks AG\n * Copyright (C) 2011 Steffen Klassert <steffen.klassert@secunet.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public License,\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 1, 1, 0, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
157
Determine whether the code is vulnerable or not.
[ "/*\n * Crypto user configuration API.\n *\n * Copyright (C) 2011 secunet Security Networks AG\n * Copyright (C) 2011 Steffen Klassert <steffen.klassert@secunet.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public License,\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
157
Determine whether the code is vulnerable or not.
[ "/*\n * Cryptographic API.\n *\n * Partial (de)compression operations.\n *\n * Copyright 2008 Sony Corporation\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; version 2 of the Lice...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
157
Determine whether the code is vulnerable or not.
[ "/*\n * Cryptographic API.\n *\n * RNG operations.\n *\n * Copyright (c) 2008 Neil Horman <nhorman@tuxdriver.com>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 o...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
REPOSVUL
157
Determine whether the code is vulnerable or not.
[ "/*\n * Synchronous Cryptographic Hash operations.\n *\n * Copyright (c) 2008 Herbert Xu <herbert@gondor.apana.org.au>\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either versio...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
157
Determine whether the code is vulnerable or not.
[ "/*\n * rlm_unix.c\tauthentication: Unix user authentication\n *\t\taccounting: Functions to write radwtmp file.\n *\t\tAlso contains handler for \"Group\".\n *\n * Version:\t$Id$\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public Li...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
158
Determine whether the code is vulnerable or not.
[ "/*\n * Copyright (c) 2000-2006 Silicon Graphics, Inc.\n * All Rights Reserved.\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License as\n * published by the Free Software Foundation.\n *\n * This program is distributed in the hope that...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
159
Determine whether the code is vulnerable or not.
[ "/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */\n/*\n * COPYRIGHT (C) 2006,2007\n * THE REGENTS OF THE UNIVERSITY OF MICHIGAN\n * ALL RIGHTS RESERVED\n *\n * Permission is granted to use, copy, create derivative works\n * and redistribute this software and such derivative works\n * for any purpose,...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
160
Determine whether the code is vulnerable or not.
[ "/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */\n/*\n * COPYRIGHT (C) 2006,2007\n * THE REGENTS OF THE UNIVERSITY OF MICHIGAN\n * ALL RIGHTS RESERVED\n *\n * Permission is granted to use, copy, create derivative works\n * and redistribute this software and such derivative works\n * for any purpose,...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
161
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tDefinitions for the Interfaces handler.\n *\n * Version:\t@(#)dev.h\t1.0.10\t08/12/93\n *\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
162
Determine whether the code is vulnerable or not.
[ "/*\n * INET\t\tAn implementation of the TCP/IP protocol suite for the LINUX\n *\t\toperating system. INET is implemented using the BSD Socket\n *\t\tinterface as the means of communication with the user level.\n *\n *\t\tDefinitions for the Interfaces handler.\n *\n * Version:\t@(#)dev.h\t1.0.10\t08/12/93\n *\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
162
Determine whether the code is vulnerable or not.
[ "/*\n * \tNET3\tProtocol independent device support routines.\n *\n *\t\tThis program is free software; you can redistribute it and/or\n *\t\tmodify it under the terms of the GNU General Public License\n *\t\tas published by the Free Software Foundation; either version\n *\t\t2 of the License, or (at your option) a...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
162
Determine whether the code is vulnerable or not.
[ "/*\n *\tLinux NET3:\tGRE over IP protocol decoder.\n *\n *\tAuthors: Alexey Kuznetsov (kuznet@ms2.inr.ac.ru)\n *\n *\tThis program is free software; you can redistribute it and/or\n *\tmodify it under the terms of the GNU General Public License\n *\tas published by the Free Software Foundation; either version\n *\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
162
Determine whether the code is vulnerable or not.
[ "/*\n *\tLinux NET3:\tIP/IP protocol decoder.\n *\n *\tAuthors:\n *\t\tSam Lantinga (slouken@cs.ucdavis.edu) 02/01/95\n *\n *\tFixes:\n *\t\tAlan Cox\t:\tMerged and made usable non modular (its so tiny its silly as\n *\t\t\t\t\ta module taking up 2 pages).\n *\t\tAlan Cox\t: \tFixed bug with 1.3.18 and IPIP not wo...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
REPOSVUL
162