PrimeVul-v0.1-hf / paired_train_sample.jsonl
Andrefty's picture
Add a small sample from the train split of paired_data
ff944ca
{
"idx": 0,
"project": "openssl",
"commit_id": "ca989269a2876bae79393bd54c3e72d49975fc75",
"project_url": "https://github.com/openssl/openssl",
"commit_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=ca989269a2876bae79393bd54c3e72d49975fc75",
"commit_message": "Use version in SSL_METHOD not SSL structure.\n\nWhen deciding whether to use TLS 1.2 PRF and record hash algorithms\nuse the version number in the corresponding SSL_METHOD structure\ninstead of the SSL structure. The SSL structure version is sometimes\ninaccurate. Note: OpenSSL 1.0.2 and later effectively do this already.\n(CVE-2013-6449)",
"target": 1,
"func": " long ssl_get_algorithm2(SSL *s)\n {\n long alg2 = s->s3->tmp.new_cipher->algorithm2;\n if (TLS1_get_version(s) >= TLS1_2_VERSION &&\n alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF))\n return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;\n return alg2;\n\t}\n",
"func_hash": 2.5508774765922695e+38,
"file_name": "None",
"file_hash": null,
"cwe": [
"CWE-310"
],
"cve": "CVE-2013-6449",
"cve_desc": "The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.",
"nvd_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6449"
}
{
"idx": 157856,
"project": "openssl",
"commit_id": "ca989269a2876bae79393bd54c3e72d49975fc75",
"project_url": "https://github.com/openssl/openssl",
"commit_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=ca989269a2876bae79393bd54c3e72d49975fc75",
"commit_message": "Use version in SSL_METHOD not SSL structure.\n\nWhen deciding whether to use TLS 1.2 PRF and record hash algorithms\nuse the version number in the corresponding SSL_METHOD structure\ninstead of the SSL structure. The SSL structure version is sometimes\ninaccurate. Note: OpenSSL 1.0.2 and later effectively do this already.\n(CVE-2013-6449)",
"target": 0,
"func": " long ssl_get_algorithm2(SSL *s)\n {\n long alg2 = s->s3->tmp.new_cipher->algorithm2;\n if (s->method->version == TLS1_2_VERSION &&\n alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF))\n return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;\n return alg2;\n\t}\n",
"func_hash": 1.8544816833638957e+38,
"file_name": "None",
"file_hash": null,
"cwe": [
"CWE-310"
],
"cve": "CVE-2013-6449",
"cve_desc": "The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.",
"nvd_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6449"
}