Dataset Viewer
Auto-converted to Parquet Duplicate
cve_id
stringclasses
822 values
cve_published
timestamp[ns]
cve_descriptions
stringclasses
818 values
cve_metrics
dict
cve_references
listlengths
1
34
cve_configurations
listlengths
1
5
url
stringclasses
844 values
cve_tags
sequencelengths
1
4
domain
stringclasses
1 value
issue_owner_repo
sequencelengths
2
2
issue_body
stringlengths
0
8.04k
issue_title
stringlengths
1
346
issue_comments_url
stringlengths
59
81
issue_comments_count
int64
0
146
issue_created_at
timestamp[ns]
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
40
62
issue_github_id
int64
128M
2.4B
issue_number
int64
21
125k
label
bool
2 classes
issue_msg
stringlengths
120
8.18k
issue_msg_n_tokens
int64
120
8.18k
issue_embedding
sequencelengths
3.07k
3.07k
CVE-2020-25663
2020-12-08T21:15:12.420000
A call to ConformPixelInfo() in the SetImageAlphaChannel() routine of /MagickCore/channel.c caused a subsequent heap-use-after-free or heap-buffer-overflow READ when GetPixelRed() or GetPixelBlue() was called. This could occur if an attacker is able to submit a malicious image file to be processed by ImageMagick and could lead to denial of service. It likely would not lead to anything further because the memory is used as pixel data and not e.g. a function pointer. This flaw affects ImageMagick versions prior to 7.0.9-0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891601" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8FFBE52-1112-43E2-BC1B-D1388F18988C", "versionEndExcluding": "7.0.8-56", "versionEndIncluding": null, "versionS...
https://github.com/ImageMagick/ImageMagick/issues/1723
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There is a heap-use-after-free at MagickCore/pixel-accessor.h:378:10 in GetPixelRed ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> [poc](https://drive.google.com/file/d/1liJ7nJK0A4M_us-LuLZjwmqKXukx3nbO/view?usp=sharing) please run a following cmd with poc file. `magick $PoC -despeckle -flip -monochrome -alpha Shape tmp.rla` Here's ASAN log. ``` ==8370==ERROR: AddressSanitizer: heap-use-after-free on address 0x62a000024200 at pc 0x000000796779 bp 0x7ffdf7956b10 sp 0x7ffdf7956b08 READ of size 4 at 0x62a000024200 thread T0 #0 0x796778 in GetPixelRed ImageMagick/./MagickCore/pixel-accessor.h:378:10 #1 0x7938d7 in GetPixelIntensity ImageMagick/MagickCore/pixel.c:2367:24 #2 0x258de7a in SetImageAlphaChannel ImageMagick/MagickCore/channel.c:1298:28 #3 0x625776b in CLISimpleOperatorImage ImageMagick/MagickWand/operation.c:1765:18 #4 0x6250c70 in CLISimpleOperatorImages ImageMagick/MagickWand/operation.c:3685:12 #5 0x632eddb in CLIOption ImageMagick/MagickWand/operation.c:5302:16 #6 0x5588f52 in ProcessCommandOptions ImageMagick/MagickWand/magick-cli.c:477:7 #7 0x55910cc in MagickImageCommand ImageMagick/MagickWand/magick-cli.c:796:5 #8 0x559b0e3 in MagickCommandGenesis ImageMagick/MagickWand/mogrify.c:185:14 #9 0x51c3e5 in MagickMain ImageMagick/utilities/magick.c:149:10 #10 0x519c69 in main ImageMagick/utilities/magick.c:180:10 #11 0x7fdc4a357b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #12 0x421849 in _start (magick+0x421849) 0x62a000024200 is located 0 bytes inside of 22592-byte region [0x62a000024200,0x62a000029a40) freed by thread T0 here: #0 0x4e1530 in __interceptor_free.localalias.0 (magick+0x4e1530) #1 0x6c76f0 in RelinquishAlignedMemory ImageMagick/MagickCore/memory.c:1037:3 #2 0x245efb2 in RelinquishPixelCachePixels ImageMagick/MagickCore/cache.c:974:40 #3 0x24e304f in OpenPixelCache ImageMagick/MagickCore/cache.c:3762:19 #4 0x2506bd7 in GetImagePixelCache ImageMagick/MagickCore/cache.c:1757:18 #5 0x2533d59 in SyncImagePixelCache ImageMagick/MagickCore/cache.c:5501:28 #6 0x2601f04 in SetImageColorspace ImageMagick/MagickCore/colorspace.c:1244:10 #7 0x2609fa7 in TransformsRGBImage ImageMagick/MagickCore/colorspace.c:1981:11 #8 0x2605cc8 in TransformImageColorspace ImageMagick/MagickCore/colorspace.c:1407:12 #9 0x70c801 in ConformPixelInfo ImageMagick/MagickCore/pixel.c:232:12 #10 0x258da15 in SetImageAlphaChannel ImageMagick/MagickCore/channel.c:1294:9 #11 0x625776b in CLISimpleOperatorImage ImageMagick/MagickWand/operation.c:1765:18 #12 0x6250c70 in CLISimpleOperatorImages ImageMagick/MagickWand/operation.c:3685:12 #13 0x632eddb in CLIOption ImageMagick/MagickWand/operation.c:5302:16 #14 0x5588f52 in ProcessCommandOptions ImageMagick/MagickWand/magick-cli.c:477:7 #15 0x55910cc in MagickImageCommand ImageMagick/MagickWand/magick-cli.c:796:5 #16 0x559b0e3 in MagickCommandGenesis ImageMagick/MagickWand/mogrify.c:185:14 #17 0x51c3e5 in MagickMain ImageMagick/utilities/magick.c:149:10 #18 0x519c69 in main ImageMagick/utilities/magick.c:180:10 #19 0x7fdc4a357b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 previously allocated by thread T0 here: #0 0x4e2338 in __interceptor_posix_memalign (magick+0x4e2338) #1 0x6bcd6a in AcquireAlignedMemory ImageMagick/MagickCore/memory.c:265:7 #2 0x24e0cbd in OpenPixelCache ImageMagick/MagickCore/cache.c:3733:46 #3 0x2506bd7 in GetImagePixelCache ImageMagick/MagickCore/cache.c:1757:18 #4 0x2533d59 in SyncImagePixelCache ImageMagick/MagickCore/cache.c:5501:28 #5 0x56d7ad in SetImageStorageClass ImageMagick/MagickCore/image.c:2625:10 #6 0x258d244 in SetImageAlphaChannel ImageMagick/MagickCore/channel.c:1266:14 #7 0x625776b in CLISimpleOperatorImage ImageMagick/MagickWand/operation.c:1765:18 #8 0x6250c70 in CLISimpleOperatorImages ImageMagick/MagickWand/operation.c:3685:12 #9 0x632eddb in CLIOption ImageMagick/MagickWand/operation.c:5302:16 #10 0x5588f52 in ProcessCommandOptions ImageMagick/MagickWand/magick-cli.c:477:7 #11 0x55910cc in MagickImageCommand ImageMagick/MagickWand/magick-cli.c:796:5 #12 0x559b0e3 in MagickCommandGenesis ImageMagick/MagickWand/mogrify.c:185:14 #13 0x51c3e5 in MagickMain ImageMagick/utilities/magick.c:149:10 #14 0x519c69 in main ImageMagick/utilities/magick.c:180:10 #15 0x7fdc4a357b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-use-after-free ImageMagick/./MagickCore/pixel-accessor.h:378:10 in GetPixelRed Shadow bytes around the buggy address: 0x0c547fffc7f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fffc800: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fffc810: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fffc820: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fffc830: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c547fffc840:[fd]fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c547fffc850: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c547fffc860: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c547fffc870: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c547fffc880: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c547fffc890: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==8370==ABORTING ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-68 Q16 x86_64 2019-10-06 https://imagemagick.org - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-6 CXX=clang++6 CFLAGS="-fsanitize=address,undefined -g" CXXFLAGS="-fsanitize=address,undefined -g" ./configure --disable-openmp <!-- Thanks for reporting the issue to ImageMagick! -->
heap-use-after-free at MagickCore/pixel-accessor.h in GetPixelRed
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1723/comments
4
2019-10-06T12:41:15
2020-10-29T00:07:54Z
https://github.com/ImageMagick/ImageMagick/issues/1723
503,095,531
1,723
true
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-use-after-free at MagickCore/pixel-accessor.h in GetPixelRed Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There is a heap-use-after-free at MagickCore/pixel-accessor.h:378:10 in GetPixelRed ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> [poc](https://drive.google.com/file/d/1liJ7nJK0A4M_us-LuLZjwmqKXukx3nbO/view?usp=sharing) please run a following cmd with poc file. `magick $PoC -despeckle -flip -monochrome -alpha Shape tmp.rla` Here's ASAN log. ``` ==8370==ERROR: AddressSanitizer: heap-use-after-free on address 0x62a000024200 at pc 0x000000796779 bp 0x7ffdf7956b10 sp 0x7ffdf7956b08 READ of size 4 at 0x62a000024200 thread T0 #0 0x796778 in GetPixelRed ImageMagick/./MagickCore/pixel-accessor.h:378:10 #1 0x7938d7 in GetPixelIntensity ImageMagick/MagickCore/pixel.c:2367:24 #2 0x258de7a in SetImageAlphaChannel ImageMagick/MagickCore/channel.c:1298:28 #3 0x625776b in CLISimpleOperatorImage ImageMagick/MagickWand/operation.c:1765:18 #4 0x6250c70 in CLISimpleOperatorImages ImageMagick/MagickWand/operation.c:3685:12 #5 0x632eddb in CLIOption ImageMagick/MagickWand/operation.c:5302:16 #6 0x5588f52 in ProcessCommandOptions ImageMagick/MagickWand/magick-cli.c:477:7 #7 0x55910cc in MagickImageCommand ImageMagick/MagickWand/magick-cli.c:796:5 #8 0x559b0e3 in MagickCommandGenesis ImageMagick/MagickWand/mogrify.c:185:14 #9 0x51c3e5 in MagickMain ImageMagick/utilities/magick.c:149:10 #10 0x519c69 in main ImageMagick/utilities/magick.c:180:10 #11 0x7fdc4a357b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #12 0x421849 in _start (magick+0x421849) 0x62a000024200 is located 0 bytes inside of 22592-byte region [0x62a000024200,0x62a000029a40) freed by thread T0 here: #0 0x4e1530 in __interceptor_free.localalias.0 (magick+0x4e1530) #1 0x6c76f0 in RelinquishAlignedMemory ImageMagick/MagickCore/memory.c:1037:3 #2 0x245efb2 in RelinquishPixelCachePixels ImageMagick/MagickCore/cache.c:974:40 #3 0x24e304f in OpenPixelCache ImageMagick/MagickCore/cache.c:3762:19 #4 0x2506bd7 in GetImagePixelCache ImageMagick/MagickCore/cache.c:1757:18 #5 0x2533d59 in SyncImagePixelCache ImageMagick/MagickCore/cache.c:5501:28 #6 0x2601f04 in SetImageColorspace ImageMagick/MagickCore/colorspace.c:1244:10 #7 0x2609fa7 in TransformsRGBImage ImageMagick/MagickCore/colorspace.c:1981:11 #8 0x2605cc8 in TransformImageColorspace ImageMagick/MagickCore/colorspace.c:1407:12 #9 0x70c801 in ConformPixelInfo ImageMagick/MagickCore/pixel.c:232:12 #10 0x258da15 in SetImageAlphaChannel ImageMagick/MagickCore/channel.c:1294:9 #11 0x625776b in CLISimpleOperatorImage ImageMagick/MagickWand/operation.c:1765:18 #12 0x6250c70 in CLISimpleOperatorImages ImageMagick/MagickWand/operation.c:3685:12 #13 0x632eddb in CLIOption ImageMagick/MagickWand/operation.c:5302:16 #14 0x5588f52 in ProcessCommandOptions ImageMagick/MagickWand/magick-cli.c:477:7 #15 0x55910cc in MagickImageCommand ImageMagick/MagickWand/magick-cli.c:796:5 #16 0x559b0e3 in MagickCommandGenesis ImageMagick/MagickWand/mogrify.c:185:14 #17 0x51c3e5 in MagickMain ImageMagick/utilities/magick.c:149:10 #18 0x519c69 in main ImageMagick/utilities/magick.c:180:10 #19 0x7fdc4a357b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 previously allocated by thread T0 here: #0 0x4e2338 in __interceptor_posix_memalign (magick+0x4e2338) #1 0x6bcd6a in AcquireAlignedMemory ImageMagick/MagickCore/memory.c:265:7 #2 0x24e0cbd in OpenPixelCache ImageMagick/MagickCore/cache.c:3733:46 #3 0x2506bd7 in GetImagePixelCache ImageMagick/MagickCore/cache.c:1757:18 #4 0x2533d59 in SyncImagePixelCache ImageMagick/MagickCore/cache.c:5501:28 #5 0x56d7ad in SetImageStorageClass ImageMagick/MagickCore/image.c:2625:10 #6 0x258d244 in SetImageAlphaChannel ImageMagick/MagickCore/channel.c:1266:14 #7 0x625776b in CLISimpleOperatorImage ImageMagick/MagickWand/operation.c:1765:18 #8 0x6250c70 in CLISimpleOperatorImages ImageMagick/MagickWand/operation.c:3685:12 #9 0x632eddb in CLIOption ImageMagick/MagickWand/operation.c:5302:16 #10 0x5588f52 in ProcessCommandOptions ImageMagick/MagickWand/magick-cli.c:477:7 #11 0x55910cc in MagickImageCommand ImageMagick/MagickWand/magick-cli.c:796:5 #12 0x559b0e3 in MagickCommandGenesis ImageMagick/MagickWand/mogrify.c:185:14 #13 0x51c3e5 in MagickMain ImageMagick/utilities/magick.c:149:10 #14 0x519c69 in main ImageMagick/utilities/magick.c:180:10 #15 0x7fdc4a357b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-use-after-free ImageMagick/./MagickCore/pixel-accessor.h:378:10 in GetPixelRed Shadow bytes around the buggy address: 0x0c547fffc7f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fffc800: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fffc810: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fffc820: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fffc830: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c547fffc840:[fd]fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c547fffc850: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c547fffc860: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c547fffc870: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c547fffc880: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c547fffc890: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==8370==ABORTING ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-68 Q16 x86_64 2019-10-06 https://imagemagick.org - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-6 CXX=clang++6 CFLAGS="-fsanitize=address,undefined -g" CXXFLAGS="-fsanitize=address,undefined -g" ./configure --disable-openmp <!-- Thanks for reporting the issue to ImageMagick! --> --- end body ---
7,538
[ -0.040803104639053345, -0.01668344810605049, -0.004887728951871395, -0.000345785403624177, 0.025615129619836807, 0.020360393449664116, -0.011065132915973663, 0.02897651679813862, -0.008204525336623192, 0.03015643171966076, -0.011943208985030651, -0.015970012173056602, 0.020236913114786148, ...
null
null
null
null
null
null
null
null
null
[ "ImageMagick", "ImageMagick" ]
### ImageMagick version 7.1.1-30 ### Operating system Linux ### Operating system, version and so on Ubuntu 20.04 LTS ### Description ``` ./rotate_fuzzer ./out_rotate_crash/default/crashes/id\:000000\,sig\:06\,src\:016175+01 3217_time\:36400038_execs\:207091_op\:splice_rep\:16 Reading 537 bytes from ./out_rotate_crash/default/crashes/id:000000,sig:06,src:016175+013217_time:36400038_execs:207091_op:splice_rep:16 ================================================================= ==41886==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x606000002f3c at pc 0x000001b223d4 bp 0x7ffe5bca4120 sp 0x7ffe5bca4118 WRITE of size 4 at 0x606000002f3c thread T0 #0 0x1b223d3 in opj_jp2_read_header /home/fuzz/Desktop/DDGF_Project/OSS-Test/mylibs/openjpeg/src/lib/openjp2/jp2.c:2875:37 #1 0x135795e in ReadJP2Image /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/coders/jp2.c:359:7 #2 0x9c90d4 in ReadImage /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/constitute.c:736:15 #3 0x9439d5 in BlobToImage /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/blob.c:479:13 #4 0x8190b1 in Magick::Image::read(Magick::Blob const&) /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/Magick++/lib/Image.cpp:4044:12 #5 0x37a3006 in LLVMFuzzerTestOneInput /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/oss-fuzz/rotate_fuzzer.cc:42:11 #6 0x8015dd in ExecuteFilesOnyByOne /home/fuzz/Desktop/DDGF_Project/AFLplusplus/utils/aflpp_driver/aflpp_driver.c:255:7 #7 0x8013e8 in LLVMFuzzerRunDriver /home/fuzz/Desktop/DDGF_Project/AFLplusplus/utils/aflpp_driver/aflpp_driver.c #8 0x800fa8 in main /home/fuzz/Desktop/DDGF_Project/AFLplusplus/utils/aflpp_driver/aflpp_driver.c:300:10 #9 0x7fa45548d082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #10 0x70942d in _start (/home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/oss-fuzz/rotate_fuzzer.new1+0x70942d) 0x606000002f3c is located 4 bytes to the right of 56-byte region [0x606000002f00,0x606000002f38) freed by thread T0 here: #0 0x7b8197 in __interceptor_cfree.part.0 /home/fuzz/Desktop/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:52:3 #1 0xb8a499 in RelinquishMagickMemory /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/memory.c:1167:3 previously allocated by thread T0 here: #0 0x7b8fb7 in malloc /home/fuzz/Desktop/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:69:3 #1 0xb890f2 in AcquireMagickMemory /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/memory.c:558:10 #2 0xb890f2 in AcquireCriticalMemory /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/memory.c:634:10 #3 0xc47543 in IsRightsAuthorized /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/policy.c:655:8 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/fuzz/Desktop/DDGF_Project/OSS-Test/mylibs/openjpeg/src/lib/openjp2/jp2.c:2875:37 in opj_jp2_read_header Shadow bytes around the buggy address: 0x0c0c7fff8590: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa 0x0c0c7fff85a0: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa 0x0c0c7fff85b0: fd fd fd fd fd fd fd fa fa fa fa fa fd fd fd fd 0x0c0c7fff85c0: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa 0x0c0c7fff85d0: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa =>0x0c0c7fff85e0: fd fd fd fd fd fd fd[fa]fa fa fa fa fd fd fd fd 0x0c0c7fff85f0: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa 0x0c0c7fff8600: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa 0x0c0c7fff8610: fd fd fd fd fd fd fd fa fa fa fa fa fd fd fd fd 0x0c0c7fff8620: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa 0x0c0c7fff8630: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==41886==ABORTING ``` ### Steps to Reproduce 1. compile the oss-fuzz target 2. run the fuzz target with poc. [rotate_poc.zip](https://github.com/ImageMagick/ImageMagick/files/14995709/rotate_poc.zip) ``` ./rotate_fuzzer ./poc ``` ### Images _No response_
heap-buffer-overflow
https://api.github.com/repos/ImageMagick/ImageMagick/issues/7253/comments
1
2024-04-16T10:54:15
2024-04-18T18:55:22Z
https://github.com/ImageMagick/ImageMagick/issues/7253
2,245,742,982
7,253
false
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-buffer-overflow Issue date: --- start body --- ### ImageMagick version 7.1.1-30 ### Operating system Linux ### Operating system, version and so on Ubuntu 20.04 LTS ### Description ``` ./rotate_fuzzer ./out_rotate_crash/default/crashes/id\:000000\,sig\:06\,src\:016175+01 3217_time\:36400038_execs\:207091_op\:splice_rep\:16 Reading 537 bytes from ./out_rotate_crash/default/crashes/id:000000,sig:06,src:016175+013217_time:36400038_execs:207091_op:splice_rep:16 ================================================================= ==41886==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x606000002f3c at pc 0x000001b223d4 bp 0x7ffe5bca4120 sp 0x7ffe5bca4118 WRITE of size 4 at 0x606000002f3c thread T0 #0 0x1b223d3 in opj_jp2_read_header /home/fuzz/Desktop/DDGF_Project/OSS-Test/mylibs/openjpeg/src/lib/openjp2/jp2.c:2875:37 #1 0x135795e in ReadJP2Image /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/coders/jp2.c:359:7 #2 0x9c90d4 in ReadImage /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/constitute.c:736:15 #3 0x9439d5 in BlobToImage /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/blob.c:479:13 #4 0x8190b1 in Magick::Image::read(Magick::Blob const&) /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/Magick++/lib/Image.cpp:4044:12 #5 0x37a3006 in LLVMFuzzerTestOneInput /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/oss-fuzz/rotate_fuzzer.cc:42:11 #6 0x8015dd in ExecuteFilesOnyByOne /home/fuzz/Desktop/DDGF_Project/AFLplusplus/utils/aflpp_driver/aflpp_driver.c:255:7 #7 0x8013e8 in LLVMFuzzerRunDriver /home/fuzz/Desktop/DDGF_Project/AFLplusplus/utils/aflpp_driver/aflpp_driver.c #8 0x800fa8 in main /home/fuzz/Desktop/DDGF_Project/AFLplusplus/utils/aflpp_driver/aflpp_driver.c:300:10 #9 0x7fa45548d082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #10 0x70942d in _start (/home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/oss-fuzz/rotate_fuzzer.new1+0x70942d) 0x606000002f3c is located 4 bytes to the right of 56-byte region [0x606000002f00,0x606000002f38) freed by thread T0 here: #0 0x7b8197 in __interceptor_cfree.part.0 /home/fuzz/Desktop/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:52:3 #1 0xb8a499 in RelinquishMagickMemory /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/memory.c:1167:3 previously allocated by thread T0 here: #0 0x7b8fb7 in malloc /home/fuzz/Desktop/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:69:3 #1 0xb890f2 in AcquireMagickMemory /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/memory.c:558:10 #2 0xb890f2 in AcquireCriticalMemory /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/memory.c:634:10 #3 0xc47543 in IsRightsAuthorized /home/fuzz/Desktop/DDGF_Project/OSS-Test/ImageMagick/MagickCore/policy.c:655:8 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/fuzz/Desktop/DDGF_Project/OSS-Test/mylibs/openjpeg/src/lib/openjp2/jp2.c:2875:37 in opj_jp2_read_header Shadow bytes around the buggy address: 0x0c0c7fff8590: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa 0x0c0c7fff85a0: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa 0x0c0c7fff85b0: fd fd fd fd fd fd fd fa fa fa fa fa fd fd fd fd 0x0c0c7fff85c0: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa 0x0c0c7fff85d0: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa =>0x0c0c7fff85e0: fd fd fd fd fd fd fd[fa]fa fa fa fa fd fd fd fd 0x0c0c7fff85f0: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa 0x0c0c7fff8600: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa 0x0c0c7fff8610: fd fd fd fd fd fd fd fa fa fa fa fa fd fd fd fd 0x0c0c7fff8620: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa 0x0c0c7fff8630: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==41886==ABORTING ``` ### Steps to Reproduce 1. compile the oss-fuzz target 2. run the fuzz target with poc. [rotate_poc.zip](https://github.com/ImageMagick/ImageMagick/files/14995709/rotate_poc.zip) ``` ./rotate_fuzzer ./poc ``` ### Images _No response_ --- end body ---
4,859
[ -0.017205795273184776, -0.009327657520771027, -0.00037868693470954895, 0.03148356080055237, 0.03429562970995903, 0.023177815601229668, -0.027410412207245827, 0.033396925777196884, -0.03229529410600662, 0.03736861050128937, -0.0015346786240115762, -0.018524857237935066, 0.00731644919142127, ...
CVE-2019-17453
2019-10-10T17:15:17.843000
"Bento4 1.5.1.0 has a NULL pointer dereference in AP4_DescriptorListWriter::Action in Core/Ap4Descri(...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://github.com/axiom(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*","matchCriteriaI(...TRUNCATED)
https://github.com/axiomatic-systems/Bento4/issues/436
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
"**System Details**\r\nCommit ID: bc1b02a\r\nTest Machine : Ubuntu 16.04.3 LTS\r\nMP4 Compacter - Ve(...TRUNCATED)
SEGV in mp4compact
https://api.github.com/repos/axiomatic-systems/Bento4/issues/436/comments
0
2019-09-30T07:47:11
2019-10-08T05:14:45Z
https://github.com/axiomatic-systems/Bento4/issues/436
500,109,805
436
true
"This is a GitHub Issue\nrepo:Bento4\nowner:axiomatic-systems\nTitle : SEGV in mp4compact\nIssue dat(...TRUNCATED)
2,378
[-0.011965548619627953,0.04515301063656807,-0.0026640277355909348,-0.005301716271787882,0.0329315960(...TRUNCATED)
CVE-2019-20159
2019-12-31T00:15:12.243000
"An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a memory lea(...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"],"url":"https://github.com/gpac/(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*","matchCriteriaId":"93E(...TRUNCATED)
https://github.com/gpac/gpac/issues/1321
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
"System info: \r\nUbuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (master 6ada10e) \r\nCompile Command:\r(...TRUNCATED)
AddressSanitizer: a memory leak of dinf_New()
https://api.github.com/repos/gpac/gpac/issues/1321/comments
2
2019-10-28T16:03:11
2020-01-08T12:43:28Z
https://github.com/gpac/gpac/issues/1321
513,400,465
1,321
true
"This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : AddressSanitizer: a memory leak of dinf_New((...TRUNCATED)
1,983
[-0.041972242295742035,0.04615168273448944,-0.013360867276787758,-0.010663499124348164,0.02014134079(...TRUNCATED)
null
null
null
null
null
null
null
null
null
[ "MonetDB", "MonetDB" ]
"**Describe the bug**\r\nThe `IS DISTINCT FROM` operator in MonetDB returns unexpected results when (...TRUNCATED)
Unexpected result when using `IS DISTINCT FROM` with `RIGHT JOIN`
https://api.github.com/repos/MonetDB/MonetDB/issues/7527/comments
1
2024-05-30T10:13:24
2024-06-27T13:20:22Z
https://github.com/MonetDB/MonetDB/issues/7527
2,325,283,524
7,527
false
"This is a GitHub Issue\nrepo:MonetDB\nowner:MonetDB\nTitle : Unexpected result when using `IS DISTI(...TRUNCATED)
1,781
[0.01669452153146267,-0.017701834440231323,-0.015351438894867897,0.049452316015958786,-0.00913967937(...TRUNCATED)
CVE-2021-44921
2021-12-21T21:15:07.630000
"A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_isom_parse_movie_boxes_inte(...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"MEDIUM(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Third Party Advisory"],"url":"https:/(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*","matchCriteriaId":"56F(...TRUNCATED)
https://github.com/gpac/gpac/issues/1964
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
"Thanks for reporting your issue. Please make sure these boxes are checked before submitting your is(...TRUNCATED)
Null Pointer Dereference in gf_isom_parse_movie_boxes_internal()
https://api.github.com/repos/gpac/gpac/issues/1964/comments
0
2021-12-10T10:59:02
2021-12-13T13:22:06Z
https://github.com/gpac/gpac/issues/1964
1,076,718,691
1,964
true
"This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : Null Pointer Dereference in gf_isom_parse_mo(...TRUNCATED)
5,812
[-0.02625890076160431,0.031018778681755066,-0.0105180274695158,0.027228236198425293,0.02110839448869(...TRUNCATED)
null
null
null
null
null
null
null
null
null
[ "kubernetes", "kubernetes" ]
"### What would you like to be added?\n\nwhen apiserver cache is not ready, the List request with r(...TRUNCATED)
"when apiserver cache is not ready, the List request with resourceVersion=0 fetch data from the api(...TRUNCATED)
https://api.github.com/repos/kubernetes/kubernetes/issues/124818/comments
7
2024-05-11T09:59:41
2024-07-29T07:15:18Z
https://github.com/kubernetes/kubernetes/issues/124818
2,290,815,666
124,818
false
"This is a GitHub Issue\nrepo:kubernetes\nowner:kubernetes\nTitle : when apiserver cache is not read(...TRUNCATED)
1,704
[-0.03332585096359253,0.010824454948306084,-0.011891855858266354,0.003433236153796315,0.017035441473(...TRUNCATED)
null
null
null
null
null
null
null
null
null
[ "axiomatic-systems", "Bento4" ]
"Assuming I already have an HLS fragment generated (with .mp4 version, not .ts), how can I use `mp4e(...TRUNCATED)
Encrypt HLS segments ClearKey
https://api.github.com/repos/axiomatic-systems/Bento4/issues/892/comments
0
2023-09-11T13:34:06
2023-09-12T15:30:41Z
https://github.com/axiomatic-systems/Bento4/issues/892
1,890,531,918
892
false
"This is a GitHub Issue\nrepo:Bento4\nowner:axiomatic-systems\nTitle : Encrypt HLS segments ClearKey(...TRUNCATED)
311
[-0.017340650781989098,-0.0024890098720788956,-0.01838240958750248,-0.005080217495560646,0.000993131(...TRUNCATED)
null
null
null
null
null
null
null
null
null
[ "gpac", "gpac" ]
"## Description\r\nThere is a heap buffer overflow detected by AddressSanitizer\r\n\r\n## System inf(...TRUNCATED)
There is a heap buffer overflow detected by AddressSanitizer
https://api.github.com/repos/gpac/gpac/issues/2100/comments
0
2022-02-08T04:09:59
2022-02-08T15:23:18Z
https://github.com/gpac/gpac/issues/2100
1,126,769,626
2,100
false
"This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : There is a heap buffer overflow detected by (...TRUNCATED)
3,961
[-0.043730221688747406,0.020210150629281998,-0.012580502778291702,0.01618495024740696,0.032790653407(...TRUNCATED)
null
null
null
null
null
null
null
null
null
[ "dromara", "hutool" ]
"现在LocalDateTimeUtil.endOfDay只能接收LocalDateTime\r\n\r\n希望可以重载一个接收Loca(...TRUNCATED)
需求请求:LocalDateTimeUtil.endOfDay重载一个接收LocalDate的方法
https://api.github.com/repos/dromara/hutool/issues/3594/comments
3
2024-05-23T07:33:39
2024-05-23T08:54:01Z
https://github.com/dromara/hutool/issues/3594
2,312,174,076
3,594
false
"This is a GitHub Issue\nrepo:hutool\nowner:dromara\nTitle : 需求请求:LocalDateTimeUtil.endOfD(...TRUNCATED)
228
[-0.01445379015058279,-0.017438963055610657,-0.0033548481296747923,0.028088392689824104,0.0195632949(...TRUNCATED)
End of preview. Expand in Data Studio

Dataset Description

Following data collection and processing, we have created the first dataset comprising a total of 4,379 GitHub issues. Of these, 844 are linked to disclosed CVE vulnerabilities, while 3,535 represent issues unrelated to any vulnerabilities. These issues are taken from 31 different repositories. For each issue linked to a vulnerability, we include CVE ID, disclosure date, vulnerability description, a list of references, details on the affected software, and vulnerability impact metrics updated until August 11th, 2024.

Fields

  1. cve_id: The unique CVE identifier.
  2. cve_published: The timestamp when the CVE was published.
  3. cve_descriptions: Textual descriptions of the CVE.
  4. cve_metrics: Container of CVSS metric information.
  5. cve_references: List of external reference links.
  6. cve_configurations: Details about affected configurations.
  7. url: The primary link to the source or CVE entry.
  8. cve_tags: Tags categorizing the CVE.
  9. domain: Domain of the refenrece link.
  10. issue_owner_repo: Repository owner and name from GitHub.
  11. issue_body: Body text of the GitHub issue.
  12. issue_title: Title of the GitHub issue.
  13. issue_comments_url: API URL for issue comments.
  14. issue_comments_count: Number of comments on the issue.
  15. issue_created_at: Timestamp of issue creation.
  16. issue_updated_at: Timestamp of the last issue update.
  17. issue_html_url: Web link to view the issue on GitHub.
  18. issue_github_id: GitHub's unique ID for the issue.
  19. issue_number: Issue number in the repository.
  20. label: Boolean label (true/false) for classification.
  21. issue_msg: Prompt used for the generation of the embedding.
  22. issue_msg_n_tokens: Number of tokens in the prompt.
  23. issue_embedding: Embedding of the prompt generated with text-embedding-3-large.
Downloads last month
44

Collection including DanCip/github-issues-vulnerability-detection

Paper for DanCip/github-issues-vulnerability-detection