Automating Vulnerability Detection in GitHub Issues
Collection
https://arxiv.org/abs/2501.05258 • 3 items • Updated
cve_id stringclasses 822 values | cve_published timestamp[ns] | cve_descriptions stringclasses 818 values | cve_metrics dict | cve_references listlengths 1 34 ⌀ | cve_configurations listlengths 1 5 ⌀ | url stringclasses 844 values | cve_tags sequencelengths 1 4 ⌀ | domain stringclasses 1 value | issue_owner_repo sequencelengths 2 2 | issue_body stringlengths 0 8.04k ⌀ | issue_title stringlengths 1 346 | issue_comments_url stringlengths 59 81 | issue_comments_count int64 0 146 | issue_created_at timestamp[ns] | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 40 62 | issue_github_id int64 128M 2.4B | issue_number int64 21 125k | label bool 2 classes | issue_msg stringlengths 120 8.18k | issue_msg_n_tokens int64 120 8.18k | issue_embedding sequencelengths 3.07k 3.07k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2020-25663 | 2020-12-08T21:15:12.420000 | A call to ConformPixelInfo() in the SetImageAlphaChannel() routine of /MagickCore/channel.c caused a subsequent heap-use-after-free or heap-buffer-overflow READ when GetPixelRed() or GetPixelBlue() was called. This could occur if an attacker is able to submit a malicious image file to be processed by ImageMagick and could lead to denial of service. It likely would not lead to anything further because the memory is used as pixel data and not e.g. a function pointer. This flaw affects ImageMagick versions prior to 7.0.9-0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891601"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8FFBE52-1112-43E2-BC1B-D1388F18988C",
"versionEndExcluding": "7.0.8-56",
"versionEndIncluding": null,
"versionS... | https://github.com/ImageMagick/ImageMagick/issues/1723 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There is a heap-use-after-free at MagickCore/pixel-accessor.h:378:10 in GetPixelRed
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
[poc](https://drive.google.com/file/d/1liJ7nJK0A4M_us-LuLZjwmqKXukx3nbO/view?usp=sharing)
please run a following cmd with poc file.
`magick $PoC -despeckle -flip -monochrome -alpha Shape tmp.rla`
Here's ASAN log.
```
==8370==ERROR: AddressSanitizer: heap-use-after-free on address 0x62a000024200 at pc 0x000000796779 bp 0x7ffdf7956b10 sp 0x7ffdf7956b08
READ of size 4 at 0x62a000024200 thread T0
#0 0x796778 in GetPixelRed ImageMagick/./MagickCore/pixel-accessor.h:378:10
#1 0x7938d7 in GetPixelIntensity ImageMagick/MagickCore/pixel.c:2367:24
#2 0x258de7a in SetImageAlphaChannel ImageMagick/MagickCore/channel.c:1298:28
#3 0x625776b in CLISimpleOperatorImage ImageMagick/MagickWand/operation.c:1765:18
#4 0x6250c70 in CLISimpleOperatorImages ImageMagick/MagickWand/operation.c:3685:12
#5 0x632eddb in CLIOption ImageMagick/MagickWand/operation.c:5302:16
#6 0x5588f52 in ProcessCommandOptions ImageMagick/MagickWand/magick-cli.c:477:7
#7 0x55910cc in MagickImageCommand ImageMagick/MagickWand/magick-cli.c:796:5
#8 0x559b0e3 in MagickCommandGenesis ImageMagick/MagickWand/mogrify.c:185:14
#9 0x51c3e5 in MagickMain ImageMagick/utilities/magick.c:149:10
#10 0x519c69 in main ImageMagick/utilities/magick.c:180:10
#11 0x7fdc4a357b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
#12 0x421849 in _start (magick+0x421849)
0x62a000024200 is located 0 bytes inside of 22592-byte region [0x62a000024200,0x62a000029a40)
freed by thread T0 here:
#0 0x4e1530 in __interceptor_free.localalias.0 (magick+0x4e1530)
#1 0x6c76f0 in RelinquishAlignedMemory ImageMagick/MagickCore/memory.c:1037:3
#2 0x245efb2 in RelinquishPixelCachePixels ImageMagick/MagickCore/cache.c:974:40
#3 0x24e304f in OpenPixelCache ImageMagick/MagickCore/cache.c:3762:19
#4 0x2506bd7 in GetImagePixelCache ImageMagick/MagickCore/cache.c:1757:18
#5 0x2533d59 in SyncImagePixelCache ImageMagick/MagickCore/cache.c:5501:28
#6 0x2601f04 in SetImageColorspace ImageMagick/MagickCore/colorspace.c:1244:10
#7 0x2609fa7 in TransformsRGBImage ImageMagick/MagickCore/colorspace.c:1981:11
#8 0x2605cc8 in TransformImageColorspace ImageMagick/MagickCore/colorspace.c:1407:12
#9 0x70c801 in ConformPixelInfo ImageMagick/MagickCore/pixel.c:232:12
#10 0x258da15 in SetImageAlphaChannel ImageMagick/MagickCore/channel.c:1294:9
#11 0x625776b in CLISimpleOperatorImage ImageMagick/MagickWand/operation.c:1765:18
#12 0x6250c70 in CLISimpleOperatorImages ImageMagick/MagickWand/operation.c:3685:12
#13 0x632eddb in CLIOption ImageMagick/MagickWand/operation.c:5302:16
#14 0x5588f52 in ProcessCommandOptions ImageMagick/MagickWand/magick-cli.c:477:7
#15 0x55910cc in MagickImageCommand ImageMagick/MagickWand/magick-cli.c:796:5
#16 0x559b0e3 in MagickCommandGenesis ImageMagick/MagickWand/mogrify.c:185:14
#17 0x51c3e5 in MagickMain ImageMagick/utilities/magick.c:149:10
#18 0x519c69 in main ImageMagick/utilities/magick.c:180:10
#19 0x7fdc4a357b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
previously allocated by thread T0 here:
#0 0x4e2338 in __interceptor_posix_memalign (magick+0x4e2338)
#1 0x6bcd6a in AcquireAlignedMemory ImageMagick/MagickCore/memory.c:265:7
#2 0x24e0cbd in OpenPixelCache ImageMagick/MagickCore/cache.c:3733:46
#3 0x2506bd7 in GetImagePixelCache ImageMagick/MagickCore/cache.c:1757:18
#4 0x2533d59 in SyncImagePixelCache ImageMagick/MagickCore/cache.c:5501:28
#5 0x56d7ad in SetImageStorageClass ImageMagick/MagickCore/image.c:2625:10
#6 0x258d244 in SetImageAlphaChannel ImageMagick/MagickCore/channel.c:1266:14
#7 0x625776b in CLISimpleOperatorImage ImageMagick/MagickWand/operation.c:1765:18
#8 0x6250c70 in CLISimpleOperatorImages ImageMagick/MagickWand/operation.c:3685:12
#9 0x632eddb in CLIOption ImageMagick/MagickWand/operation.c:5302:16
#10 0x5588f52 in ProcessCommandOptions ImageMagick/MagickWand/magick-cli.c:477:7
#11 0x55910cc in MagickImageCommand ImageMagick/MagickWand/magick-cli.c:796:5
#12 0x559b0e3 in MagickCommandGenesis ImageMagick/MagickWand/mogrify.c:185:14
#13 0x51c3e5 in MagickMain ImageMagick/utilities/magick.c:149:10
#14 0x519c69 in main ImageMagick/utilities/magick.c:180:10
#15 0x7fdc4a357b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-use-after-free ImageMagick/./MagickCore/pixel-accessor.h:378:10 in GetPixelRed
Shadow bytes around the buggy address:
0x0c547fffc7f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c547fffc800: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c547fffc810: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c547fffc820: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c547fffc830: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x0c547fffc840:[fd]fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c547fffc850: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c547fffc860: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c547fffc870: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c547fffc880: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c547fffc890: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==8370==ABORTING
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-68 Q16 x86_64 2019-10-06 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-6 CXX=clang++6 CFLAGS="-fsanitize=address,undefined -g" CXXFLAGS="-fsanitize=address,undefined -g" ./configure --disable-openmp
<!-- Thanks for reporting the issue to ImageMagick! -->
| heap-use-after-free at MagickCore/pixel-accessor.h in GetPixelRed | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1723/comments | 4 | 2019-10-06T12:41:15 | 2020-10-29T00:07:54Z | https://github.com/ImageMagick/ImageMagick/issues/1723 | 503,095,531 | 1,723 | true | This is a GitHub Issue
repo:ImageMagick
owner:ImageMagick
Title : heap-use-after-free at MagickCore/pixel-accessor.h in GetPixelRed
Issue date:
--- start body ---
### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There is a heap-use-after-free at MagickCore/pixel-accessor.h:378:10 in GetPixelRed
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
[poc](https://drive.google.com/file/d/1liJ7nJK0A4M_us-LuLZjwmqKXukx3nbO/view?usp=sharing)
please run a following cmd with poc file.
`magick $PoC -despeckle -flip -monochrome -alpha Shape tmp.rla`
Here's ASAN log.
```
==8370==ERROR: AddressSanitizer: heap-use-after-free on address 0x62a000024200 at pc 0x000000796779 bp 0x7ffdf7956b10 sp 0x7ffdf7956b08
READ of size 4 at 0x62a000024200 thread T0
#0 0x796778 in GetPixelRed ImageMagick/./MagickCore/pixel-accessor.h:378:10
#1 0x7938d7 in GetPixelIntensity ImageMagick/MagickCore/pixel.c:2367:24
#2 0x258de7a in SetImageAlphaChannel ImageMagick/MagickCore/channel.c:1298:28
#3 0x625776b in CLISimpleOperatorImage ImageMagick/MagickWand/operation.c:1765:18
#4 0x6250c70 in CLISimpleOperatorImages ImageMagick/MagickWand/operation.c:3685:12
#5 0x632eddb in CLIOption ImageMagick/MagickWand/operation.c:5302:16
#6 0x5588f52 in ProcessCommandOptions ImageMagick/MagickWand/magick-cli.c:477:7
#7 0x55910cc in MagickImageCommand ImageMagick/MagickWand/magick-cli.c:796:5
#8 0x559b0e3 in MagickCommandGenesis ImageMagick/MagickWand/mogrify.c:185:14
#9 0x51c3e5 in MagickMain ImageMagick/utilities/magick.c:149:10
#10 0x519c69 in main ImageMagick/utilities/magick.c:180:10
#11 0x7fdc4a357b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
#12 0x421849 in _start (magick+0x421849)
0x62a000024200 is located 0 bytes inside of 22592-byte region [0x62a000024200,0x62a000029a40)
freed by thread T0 here:
#0 0x4e1530 in __interceptor_free.localalias.0 (magick+0x4e1530)
#1 0x6c76f0 in RelinquishAlignedMemory ImageMagick/MagickCore/memory.c:1037:3
#2 0x245efb2 in RelinquishPixelCachePixels ImageMagick/MagickCore/cache.c:974:40
#3 0x24e304f in OpenPixelCache ImageMagick/MagickCore/cache.c:3762:19
#4 0x2506bd7 in GetImagePixelCache ImageMagick/MagickCore/cache.c:1757:18
#5 0x2533d59 in SyncImagePixelCache ImageMagick/MagickCore/cache.c:5501:28
#6 0x2601f04 in SetImageColorspace ImageMagick/MagickCore/colorspace.c:1244:10
#7 0x2609fa7 in TransformsRGBImage ImageMagick/MagickCore/colorspace.c:1981:11
#8 0x2605cc8 in TransformImageColorspace ImageMagick/MagickCore/colorspace.c:1407:12
#9 0x70c801 in ConformPixelInfo ImageMagick/MagickCore/pixel.c:232:12
#10 0x258da15 in SetImageAlphaChannel ImageMagick/MagickCore/channel.c:1294:9
#11 0x625776b in CLISimpleOperatorImage ImageMagick/MagickWand/operation.c:1765:18
#12 0x6250c70 in CLISimpleOperatorImages ImageMagick/MagickWand/operation.c:3685:12
#13 0x632eddb in CLIOption ImageMagick/MagickWand/operation.c:5302:16
#14 0x5588f52 in ProcessCommandOptions ImageMagick/MagickWand/magick-cli.c:477:7
#15 0x55910cc in MagickImageCommand ImageMagick/MagickWand/magick-cli.c:796:5
#16 0x559b0e3 in MagickCommandGenesis ImageMagick/MagickWand/mogrify.c:185:14
#17 0x51c3e5 in MagickMain ImageMagick/utilities/magick.c:149:10
#18 0x519c69 in main ImageMagick/utilities/magick.c:180:10
#19 0x7fdc4a357b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
previously allocated by thread T0 here:
#0 0x4e2338 in __interceptor_posix_memalign (magick+0x4e2338)
#1 0x6bcd6a in AcquireAlignedMemory ImageMagick/MagickCore/memory.c:265:7
#2 0x24e0cbd in OpenPixelCache ImageMagick/MagickCore/cache.c:3733:46
#3 0x2506bd7 in GetImagePixelCache ImageMagick/MagickCore/cache.c:1757:18
#4 0x2533d59 in SyncImagePixelCache ImageMagick/MagickCore/cache.c:5501:28
#5 0x56d7ad in SetImageStorageClass ImageMagick/MagickCore/image.c:2625:10
#6 0x258d244 in SetImageAlphaChannel ImageMagick/MagickCore/channel.c:1266:14
#7 0x625776b in CLISimpleOperatorImage ImageMagick/MagickWand/operation.c:1765:18
#8 0x6250c70 in CLISimpleOperatorImages ImageMagick/MagickWand/operation.c:3685:12
#9 0x632eddb in CLIOption ImageMagick/MagickWand/operation.c:5302:16
#10 0x5588f52 in ProcessCommandOptions ImageMagick/MagickWand/magick-cli.c:477:7
#11 0x55910cc in MagickImageCommand ImageMagick/MagickWand/magick-cli.c:796:5
#12 0x559b0e3 in MagickCommandGenesis ImageMagick/MagickWand/mogrify.c:185:14
#13 0x51c3e5 in MagickMain ImageMagick/utilities/magick.c:149:10
#14 0x519c69 in main ImageMagick/utilities/magick.c:180:10
#15 0x7fdc4a357b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-use-after-free ImageMagick/./MagickCore/pixel-accessor.h:378:10 in GetPixelRed
Shadow bytes around the buggy address:
0x0c547fffc7f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c547fffc800: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c547fffc810: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c547fffc820: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c547fffc830: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x0c547fffc840:[fd]fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c547fffc850: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c547fffc860: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c547fffc870: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c547fffc880: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c547fffc890: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==8370==ABORTING
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-68 Q16 x86_64 2019-10-06 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-6 CXX=clang++6 CFLAGS="-fsanitize=address,undefined -g" CXXFLAGS="-fsanitize=address,undefined -g" ./configure --disable-openmp
<!-- Thanks for reporting the issue to ImageMagick! -->
--- end body ---
| 7,538 | [
-0.040803104639053345,
-0.01668344810605049,
-0.004887728951871395,
-0.000345785403624177,
0.025615129619836807,
0.020360393449664116,
-0.011065132915973663,
0.02897651679813862,
-0.008204525336623192,
0.03015643171966076,
-0.011943208985030651,
-0.015970012173056602,
0.020236913114786148,
... |
null | null | null | null | null | null | null | null | null | [
"ImageMagick",
"ImageMagick"
] | ### ImageMagick version
7.1.1-30
### Operating system
Linux
### Operating system, version and so on
Ubuntu 20.04 LTS
### Description
```
./rotate_fuzzer ./out_rotate_crash/default/crashes/id\:000000\,sig\:06\,src\:016175+01
3217_time\:36400038_execs\:207091_op\:splice_rep\:16
Reading 537 bytes from ./out_rotate_crash/default/crashes/id:000000,sig:06,src:016175+013217_time:36400038_execs:207091_op:splice_rep:16
=================================================================
==41886==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x606000002f3c at pc 0x000001b223d4 bp 0x7ffe5bca4120 sp 0x7ffe5bca4118
WRITE of size 4 at 0x606000002f3c thread T0
#0 0x1b223d3 in opj_jp2_read_header /home/fuzz/Desktop/DDGF_Project/OSS-Test/mylibs/openjpeg/src/lib/openjp2/jp2.c:2875:37
#1 0x135795e in ReadJP2Image /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/coders/jp2.c:359:7
#2 0x9c90d4 in ReadImage /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/constitute.c:736:15
#3 0x9439d5 in BlobToImage /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/blob.c:479:13
#4 0x8190b1 in Magick::Image::read(Magick::Blob const&) /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/Magick++/lib/Image.cpp:4044:12
#5 0x37a3006 in LLVMFuzzerTestOneInput /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/oss-fuzz/rotate_fuzzer.cc:42:11
#6 0x8015dd in ExecuteFilesOnyByOne /home/fuzz/Desktop/DDGF_Project/AFLplusplus/utils/aflpp_driver/aflpp_driver.c:255:7
#7 0x8013e8 in LLVMFuzzerRunDriver /home/fuzz/Desktop/DDGF_Project/AFLplusplus/utils/aflpp_driver/aflpp_driver.c
#8 0x800fa8 in main /home/fuzz/Desktop/DDGF_Project/AFLplusplus/utils/aflpp_driver/aflpp_driver.c:300:10
#9 0x7fa45548d082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16
#10 0x70942d in _start (/home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/oss-fuzz/rotate_fuzzer.new1+0x70942d)
0x606000002f3c is located 4 bytes to the right of 56-byte region [0x606000002f00,0x606000002f38)
freed by thread T0 here:
#0 0x7b8197 in __interceptor_cfree.part.0 /home/fuzz/Desktop/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:52:3
#1 0xb8a499 in RelinquishMagickMemory /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/memory.c:1167:3
previously allocated by thread T0 here:
#0 0x7b8fb7 in malloc /home/fuzz/Desktop/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:69:3
#1 0xb890f2 in AcquireMagickMemory /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/memory.c:558:10
#2 0xb890f2 in AcquireCriticalMemory /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/memory.c:634:10
#3 0xc47543 in IsRightsAuthorized /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/policy.c:655:8
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/fuzz/Desktop/DDGF_Project/OSS-Test/mylibs/openjpeg/src/lib/openjp2/jp2.c:2875:37 in opj_jp2_read_header
Shadow bytes around the buggy address:
0x0c0c7fff8590: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa
0x0c0c7fff85a0: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa
0x0c0c7fff85b0: fd fd fd fd fd fd fd fa fa fa fa fa fd fd fd fd
0x0c0c7fff85c0: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa
0x0c0c7fff85d0: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa
=>0x0c0c7fff85e0: fd fd fd fd fd fd fd[fa]fa fa fa fa fd fd fd fd
0x0c0c7fff85f0: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa
0x0c0c7fff8600: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa
0x0c0c7fff8610: fd fd fd fd fd fd fd fa fa fa fa fa fd fd fd fd
0x0c0c7fff8620: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa
0x0c0c7fff8630: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==41886==ABORTING
```
### Steps to Reproduce
1. compile the oss-fuzz target
2. run the fuzz target with poc. [rotate_poc.zip](https://github.com/ImageMagick/ImageMagick/files/14995709/rotate_poc.zip)
```
./rotate_fuzzer ./poc
```
### Images
_No response_ | heap-buffer-overflow | https://api.github.com/repos/ImageMagick/ImageMagick/issues/7253/comments | 1 | 2024-04-16T10:54:15 | 2024-04-18T18:55:22Z | https://github.com/ImageMagick/ImageMagick/issues/7253 | 2,245,742,982 | 7,253 | false | This is a GitHub Issue
repo:ImageMagick
owner:ImageMagick
Title : heap-buffer-overflow
Issue date:
--- start body ---
### ImageMagick version
7.1.1-30
### Operating system
Linux
### Operating system, version and so on
Ubuntu 20.04 LTS
### Description
```
./rotate_fuzzer ./out_rotate_crash/default/crashes/id\:000000\,sig\:06\,src\:016175+01
3217_time\:36400038_execs\:207091_op\:splice_rep\:16
Reading 537 bytes from ./out_rotate_crash/default/crashes/id:000000,sig:06,src:016175+013217_time:36400038_execs:207091_op:splice_rep:16
=================================================================
==41886==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x606000002f3c at pc 0x000001b223d4 bp 0x7ffe5bca4120 sp 0x7ffe5bca4118
WRITE of size 4 at 0x606000002f3c thread T0
#0 0x1b223d3 in opj_jp2_read_header /home/fuzz/Desktop/DDGF_Project/OSS-Test/mylibs/openjpeg/src/lib/openjp2/jp2.c:2875:37
#1 0x135795e in ReadJP2Image /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/coders/jp2.c:359:7
#2 0x9c90d4 in ReadImage /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/constitute.c:736:15
#3 0x9439d5 in BlobToImage /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/blob.c:479:13
#4 0x8190b1 in Magick::Image::read(Magick::Blob const&) /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/Magick++/lib/Image.cpp:4044:12
#5 0x37a3006 in LLVMFuzzerTestOneInput /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/oss-fuzz/rotate_fuzzer.cc:42:11
#6 0x8015dd in ExecuteFilesOnyByOne /home/fuzz/Desktop/DDGF_Project/AFLplusplus/utils/aflpp_driver/aflpp_driver.c:255:7
#7 0x8013e8 in LLVMFuzzerRunDriver /home/fuzz/Desktop/DDGF_Project/AFLplusplus/utils/aflpp_driver/aflpp_driver.c
#8 0x800fa8 in main /home/fuzz/Desktop/DDGF_Project/AFLplusplus/utils/aflpp_driver/aflpp_driver.c:300:10
#9 0x7fa45548d082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16
#10 0x70942d in _start (/home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/oss-fuzz/rotate_fuzzer.new1+0x70942d)
0x606000002f3c is located 4 bytes to the right of 56-byte region [0x606000002f00,0x606000002f38)
freed by thread T0 here:
#0 0x7b8197 in __interceptor_cfree.part.0 /home/fuzz/Desktop/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:52:3
#1 0xb8a499 in RelinquishMagickMemory /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/memory.c:1167:3
previously allocated by thread T0 here:
#0 0x7b8fb7 in malloc /home/fuzz/Desktop/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:69:3
#1 0xb890f2 in AcquireMagickMemory /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/memory.c:558:10
#2 0xb890f2 in AcquireCriticalMemory /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/memory.c:634:10
#3 0xc47543 in IsRightsAuthorized /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/policy.c:655:8
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/fuzz/Desktop/DDGF_Project/OSS-Test/mylibs/openjpeg/src/lib/openjp2/jp2.c:2875:37 in opj_jp2_read_header
Shadow bytes around the buggy address:
0x0c0c7fff8590: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa
0x0c0c7fff85a0: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa
0x0c0c7fff85b0: fd fd fd fd fd fd fd fa fa fa fa fa fd fd fd fd
0x0c0c7fff85c0: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa
0x0c0c7fff85d0: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa
=>0x0c0c7fff85e0: fd fd fd fd fd fd fd[fa]fa fa fa fa fd fd fd fd
0x0c0c7fff85f0: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa
0x0c0c7fff8600: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa
0x0c0c7fff8610: fd fd fd fd fd fd fd fa fa fa fa fa fd fd fd fd
0x0c0c7fff8620: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa
0x0c0c7fff8630: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==41886==ABORTING
```
### Steps to Reproduce
1. compile the oss-fuzz target
2. run the fuzz target with poc. [rotate_poc.zip](https://github.com/ImageMagick/ImageMagick/files/14995709/rotate_poc.zip)
```
./rotate_fuzzer ./poc
```
### Images
_No response_
--- end body ---
| 4,859 | [
-0.017205795273184776,
-0.009327657520771027,
-0.00037868693470954895,
0.03148356080055237,
0.03429562970995903,
0.023177815601229668,
-0.027410412207245827,
0.033396925777196884,
-0.03229529410600662,
0.03736861050128937,
-0.0015346786240115762,
-0.018524857237935066,
0.00731644919142127,
... |
CVE-2019-17453 | 2019-10-10T17:15:17.843000 | "Bento4 1.5.1.0 has a NULL pointer dereference in AP4_DescriptorListWriter::Action in Core/Ap4Descri(...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://github.com/axiom(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*","matchCriteriaI(...TRUNCATED) | https://github.com/axiomatic-systems/Bento4/issues/436 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | "**System Details**\r\nCommit ID: bc1b02a\r\nTest Machine : Ubuntu 16.04.3 LTS\r\nMP4 Compacter - Ve(...TRUNCATED) | SEGV in mp4compact | https://api.github.com/repos/axiomatic-systems/Bento4/issues/436/comments | 0 | 2019-09-30T07:47:11 | 2019-10-08T05:14:45Z | https://github.com/axiomatic-systems/Bento4/issues/436 | 500,109,805 | 436 | true | "This is a GitHub Issue\nrepo:Bento4\nowner:axiomatic-systems\nTitle : SEGV in mp4compact\nIssue dat(...TRUNCATED) | 2,378 | [-0.011965548619627953,0.04515301063656807,-0.0026640277355909348,-0.005301716271787882,0.0329315960(...TRUNCATED) |
CVE-2019-20159 | 2019-12-31T00:15:12.243000 | "An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a memory lea(...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://github.com/gpac/(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*","matchCriteriaId":"93E(...TRUNCATED) | https://github.com/gpac/gpac/issues/1321 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | "System info: \r\nUbuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (master 6ada10e) \r\nCompile Command:\r(...TRUNCATED) | AddressSanitizer: a memory leak of dinf_New() | https://api.github.com/repos/gpac/gpac/issues/1321/comments | 2 | 2019-10-28T16:03:11 | 2020-01-08T12:43:28Z | https://github.com/gpac/gpac/issues/1321 | 513,400,465 | 1,321 | true | "This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : AddressSanitizer: a memory leak of dinf_New((...TRUNCATED) | 1,983 | [-0.041972242295742035,0.04615168273448944,-0.013360867276787758,-0.010663499124348164,0.02014134079(...TRUNCATED) |
null | null | null | null | null | null | null | null | null | [
"MonetDB",
"MonetDB"
] | "**Describe the bug**\r\nThe `IS DISTINCT FROM` operator in MonetDB returns unexpected results when (...TRUNCATED) | Unexpected result when using `IS DISTINCT FROM` with `RIGHT JOIN` | https://api.github.com/repos/MonetDB/MonetDB/issues/7527/comments | 1 | 2024-05-30T10:13:24 | 2024-06-27T13:20:22Z | https://github.com/MonetDB/MonetDB/issues/7527 | 2,325,283,524 | 7,527 | false | "This is a GitHub Issue\nrepo:MonetDB\nowner:MonetDB\nTitle : Unexpected result when using `IS DISTI(...TRUNCATED) | 1,781 | [0.01669452153146267,-0.017701834440231323,-0.015351438894867897,0.049452316015958786,-0.00913967937(...TRUNCATED) |
CVE-2021-44921 | 2021-12-21T21:15:07.630000 | "A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_isom_parse_movie_boxes_inte(...TRUNCATED) | {"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED) | [{"source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Third Party Advisory"],"url":"https:/(...TRUNCATED) | [{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*","matchCriteriaId":"56F(...TRUNCATED) | https://github.com/gpac/gpac/issues/1964 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | "Thanks for reporting your issue. Please make sure these boxes are checked before submitting your is(...TRUNCATED) | Null Pointer Dereference in gf_isom_parse_movie_boxes_internal() | https://api.github.com/repos/gpac/gpac/issues/1964/comments | 0 | 2021-12-10T10:59:02 | 2021-12-13T13:22:06Z | https://github.com/gpac/gpac/issues/1964 | 1,076,718,691 | 1,964 | true | "This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : Null Pointer Dereference in gf_isom_parse_mo(...TRUNCATED) | 5,812 | [-0.02625890076160431,0.031018778681755066,-0.0105180274695158,0.027228236198425293,0.02110839448869(...TRUNCATED) |
null | null | null | null | null | null | null | null | null | [
"kubernetes",
"kubernetes"
] | "### What would you like to be added?\n\nwhen apiserver cache is not ready, the List request with r(...TRUNCATED) | "when apiserver cache is not ready, the List request with resourceVersion=0 fetch data from the api(...TRUNCATED) | https://api.github.com/repos/kubernetes/kubernetes/issues/124818/comments | 7 | 2024-05-11T09:59:41 | 2024-07-29T07:15:18Z | https://github.com/kubernetes/kubernetes/issues/124818 | 2,290,815,666 | 124,818 | false | "This is a GitHub Issue\nrepo:kubernetes\nowner:kubernetes\nTitle : when apiserver cache is not read(...TRUNCATED) | 1,704 | [-0.03332585096359253,0.010824454948306084,-0.011891855858266354,0.003433236153796315,0.017035441473(...TRUNCATED) |
null | null | null | null | null | null | null | null | null | [
"axiomatic-systems",
"Bento4"
] | "Assuming I already have an HLS fragment generated (with .mp4 version, not .ts), how can I use `mp4e(...TRUNCATED) | Encrypt HLS segments ClearKey | https://api.github.com/repos/axiomatic-systems/Bento4/issues/892/comments | 0 | 2023-09-11T13:34:06 | 2023-09-12T15:30:41Z | https://github.com/axiomatic-systems/Bento4/issues/892 | 1,890,531,918 | 892 | false | "This is a GitHub Issue\nrepo:Bento4\nowner:axiomatic-systems\nTitle : Encrypt HLS segments ClearKey(...TRUNCATED) | 311 | [-0.017340650781989098,-0.0024890098720788956,-0.01838240958750248,-0.005080217495560646,0.000993131(...TRUNCATED) |
null | null | null | null | null | null | null | null | null | [
"gpac",
"gpac"
] | "## Description\r\nThere is a heap buffer overflow detected by AddressSanitizer\r\n\r\n## System inf(...TRUNCATED) | There is a heap buffer overflow detected by AddressSanitizer | https://api.github.com/repos/gpac/gpac/issues/2100/comments | 0 | 2022-02-08T04:09:59 | 2022-02-08T15:23:18Z | https://github.com/gpac/gpac/issues/2100 | 1,126,769,626 | 2,100 | false | "This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : There is a heap buffer overflow detected by (...TRUNCATED) | 3,961 | [-0.043730221688747406,0.020210150629281998,-0.012580502778291702,0.01618495024740696,0.032790653407(...TRUNCATED) |
null | null | null | null | null | null | null | null | null | [
"dromara",
"hutool"
] | "现在LocalDateTimeUtil.endOfDay只能接收LocalDateTime\r\n\r\n希望可以重载一个接收Loca(...TRUNCATED) | 需求请求:LocalDateTimeUtil.endOfDay重载一个接收LocalDate的方法 | https://api.github.com/repos/dromara/hutool/issues/3594/comments | 3 | 2024-05-23T07:33:39 | 2024-05-23T08:54:01Z | https://github.com/dromara/hutool/issues/3594 | 2,312,174,076 | 3,594 | false | "This is a GitHub Issue\nrepo:hutool\nowner:dromara\nTitle : 需求请求:LocalDateTimeUtil.endOfD(...TRUNCATED) | 228 | [-0.01445379015058279,-0.017438963055610657,-0.0033548481296747923,0.028088392689824104,0.0195632949(...TRUNCATED) |
Following data collection and processing, we have created the first dataset comprising a total of 4,379 GitHub issues. Of these, 844 are linked to disclosed CVE vulnerabilities, while 3,535 represent issues unrelated to any vulnerabilities. These issues are taken from 31 different repositories. For each issue linked to a vulnerability, we include CVE ID, disclosure date, vulnerability description, a list of references, details on the affected software, and vulnerability impact metrics updated until August 11th, 2024.